Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37663: n/a

0
Medium
VulnerabilityCVE-2024-37663cvecve-2024-37663
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37663 is a medium-severity vulnerability affecting Redmi router RB03 version 1. 0. 57, allowing an attacker on the same WLAN to send forged ICMP redirect messages. This enables the attacker to hijack network traffic between the victim and remote servers by manipulating routing information. Exploitation requires local network access, low attack complexity, and limited privileges with user interaction. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability is categorized under CWE-940, related to improper handling of ICMP redirects. Organizations using this router model should monitor for firmware updates and consider network segmentation and monitoring to mitigate risk. Countries with significant Redmi router market presence and high WLAN usage are most at risk, including China, India, and several others.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:17:56 UTC

Technical Analysis

CVE-2024-37663 identifies a vulnerability in the Redmi router RB03 running firmware version 1.0.57, where the device improperly processes ICMP redirect messages. ICMP redirect messages are used in IP networking to inform hosts of a better route for sending packets. However, if an attacker on the same wireless LAN can forge these messages, they can manipulate the victim's routing table to redirect traffic through the attacker's device. This attack vector enables man-in-the-middle (MITM) scenarios, allowing interception, modification, or monitoring of network traffic between the victim and remote servers. The vulnerability requires the attacker to be on the same WLAN as the victim, implying local network access is necessary. The CVSS 3.1 base score is 4.1 (medium), reflecting low attack complexity, the need for limited privileges, and user interaction, with impacts primarily on confidentiality and integrity but not availability. The vulnerability falls under CWE-940, which involves improper handling of ICMP redirect messages. No patches or known exploits are currently available, indicating that the vulnerability is newly disclosed and not yet widely exploited. The lack of patch links suggests that users should be vigilant for firmware updates from the vendor. The threat is particularly relevant for environments where Redmi RB03 routers are deployed and WLAN access is shared or poorly secured. Attackers could exploit this to intercept sensitive data or manipulate communications within local networks.

Potential Impact

The primary impact of CVE-2024-37663 is the potential compromise of confidentiality and integrity of network traffic for users connected to vulnerable Redmi RB03 routers. By exploiting forged ICMP redirect messages, an attacker can perform man-in-the-middle attacks, intercepting or altering data transmitted between victims and remote servers. This can lead to exposure of sensitive information such as credentials, personal data, or business communications. Although availability is not affected, the integrity and confidentiality breaches can have serious consequences, including data theft, session hijacking, or injection of malicious content. The requirement for local network access limits the scope to environments where attackers can connect to the same WLAN, such as public Wi-Fi hotspots, corporate wireless networks, or shared residential networks. Organizations with Redmi RB03 routers in such environments face increased risk, especially if WLAN access controls are weak. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers could develop exploits rapidly. Overall, the vulnerability could facilitate targeted espionage, data exfiltration, or lateral movement within compromised networks.

Mitigation Recommendations

To mitigate CVE-2024-37663, organizations and users should take the following specific actions: 1) Monitor official Redmi or Xiaomi channels for firmware updates addressing this vulnerability and apply patches promptly once available. 2) Restrict WLAN access by implementing strong authentication mechanisms such as WPA3 or WPA2-Enterprise to prevent unauthorized local network access. 3) Segment wireless networks to isolate critical devices and sensitive traffic from general user access, reducing the attack surface. 4) Deploy network monitoring tools capable of detecting anomalous ICMP redirect messages or unusual routing changes within the WLAN. 5) Educate users about the risks of connecting to untrusted or public Wi-Fi networks where attackers could exploit this vulnerability. 6) Consider disabling ICMP redirect acceptance on client devices where feasible, to prevent processing of forged redirect messages. 7) Use VPNs to encrypt traffic, mitigating the risk of interception even if routing is manipulated. 8) Conduct regular security assessments of WLAN environments to identify and remediate potential weaknesses that could facilitate local attacker presence. These targeted measures go beyond generic advice by focusing on controlling local network access, monitoring ICMP traffic, and preparing for vendor patch deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6db7ef31ef0b563e10

Added to database: 2/25/2026, 9:41:01 PM

Last enriched: 2/26/2026, 5:17:56 AM

Last updated: 2/26/2026, 9:34:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats