Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33374: n/a

0
Critical
VulnerabilityCVE-2024-33374cvecve-2024-33374
Published: Fri Jun 14 2024 (06/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the UART/Serial interface on the LB-LINK BL-W1210M v2.0 router allows attackers to access the root terminal without authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 04:28:59 UTC

Technical Analysis

CVE-2024-33374 identifies a critical security vulnerability in the LB-LINK BL-W1210M v2.0 router, specifically involving incorrect access control on the UART/Serial interface. The UART interface, typically used for low-level device management and debugging, is improperly secured, allowing attackers to access the root terminal without any authentication. This means an attacker with physical or network access to the UART interface can gain full administrative privileges on the router. The vulnerability is classified under CWE-269 (Improper Privilege Management), indicating a failure to enforce proper access controls. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no patches or known exploits are currently reported, the vulnerability poses a significant risk due to the critical nature of root access on network infrastructure devices. The lack of authentication on a sensitive interface exposes the device to complete compromise, potentially allowing attackers to manipulate routing, intercept or modify traffic, deploy malware, or disrupt network operations. The absence of patch links suggests that vendors have not yet released fixes, emphasizing the need for immediate mitigation steps by users and administrators.

Potential Impact

The impact of CVE-2024-33374 is severe for organizations using the LB-LINK BL-W1210M v2.0 router. Successful exploitation grants attackers root-level control over the device, enabling them to alter configurations, intercept or redirect network traffic, install persistent malware, or cause denial of service. This compromises the confidentiality, integrity, and availability of the network infrastructure. Organizations relying on this router for critical connectivity, including small to medium enterprises and possibly some ISP edge deployments, risk significant operational disruption and data breaches. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments with inadequate physical security or exposed management interfaces. The lack of current patches means organizations must rely on interim controls to reduce risk. Additionally, attackers could leverage compromised routers as footholds for lateral movement within networks or as platforms for launching further attacks, amplifying the overall threat landscape.

Mitigation Recommendations

To mitigate CVE-2024-33374, organizations should immediately restrict access to the UART/Serial interface on affected LB-LINK BL-W1210M v2.0 routers. This includes physically securing devices to prevent unauthorized physical access and disabling or locking down serial console access where possible. Network segmentation should be employed to isolate management interfaces from untrusted networks. Monitoring and logging of access attempts to the UART interface should be implemented to detect suspicious activity. If feasible, replace affected routers with models that have proper access controls or updated firmware once available. Until a vendor patch is released, consider deploying network-level controls such as firewall rules to block unauthorized access to router management ports. Regularly audit device configurations and firmware versions to identify vulnerable devices. Engage with LB-LINK support channels to obtain updates or guidance on forthcoming patches. Finally, educate staff on the risks of physical and network access to critical infrastructure components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c40b7ef31ef0b56193e

Added to database: 2/25/2026, 9:40:16 PM

Last enriched: 2/26/2026, 4:28:59 AM

Last updated: 4/12/2026, 10:30:26 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses