Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37855: n/a

0
High
VulnerabilityCVE-2024-37855cvecve-2024-37855
Published: Tue Jun 25 2024 (06/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37855 is a high-severity remote code execution vulnerability affecting the Nepstech Wifi Router xpon NTPL-Xpon1GFEVN hardware version 1. 0 with firmware 2. 0. 1. The flaw allows unauthenticated attackers to execute arbitrary code via the router's Telnet service on port 2345. Exploitation requires no user interaction or privileges, making it highly accessible to remote attackers with network access to the device. The vulnerability stems from improper input validation leading to code injection (CWE-94). Although no public exploits are currently known, the impact on confidentiality, integrity, and availability is critical. Organizations using this router model are at risk of full device compromise, potentially enabling network pivoting or disruption. Immediate mitigation involves disabling or restricting access to the Telnet service and applying firmware updates once available.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:25:26 UTC

Technical Analysis

CVE-2024-37855 is a remote code execution vulnerability identified in the Nepstech Wifi Router xpon (terminal) model NTPL-Xpon1GFEVN, hardware version 1.0, running firmware version 2.0.1. The vulnerability exists due to improper input validation in the router's Telnet service, which listens on port 2345. This flaw allows an unauthenticated remote attacker to send specially crafted requests to the Telnet port and execute arbitrary code on the device. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the router processes input in a way that enables code injection. The CVSS v3.1 base score is 8.4, reflecting high severity with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require authentication, making it particularly dangerous if the Telnet port is exposed or accessible within internal networks. No patches or firmware updates are currently publicly available, and no exploits have been reported in the wild as of the publication date. However, the potential for full device compromise is significant, allowing attackers to control the router, intercept or manipulate network traffic, and potentially use the device as a foothold for further network intrusion.

Potential Impact

The impact of CVE-2024-37855 is severe for organizations using the affected Nepstech Wifi Router model. Successful exploitation can lead to complete compromise of the router, allowing attackers to execute arbitrary code remotely without authentication. This jeopardizes the confidentiality of network traffic, integrity of data passing through the device, and availability of network services. Attackers could intercept sensitive communications, inject malicious payloads, disrupt network connectivity, or use the compromised router as a pivot point to launch further attacks within the internal network. Given that routers are critical infrastructure components, this vulnerability poses a significant risk to enterprise, ISP, and telecom environments. The lack of authentication and user interaction requirements increases the likelihood of exploitation, especially in environments where the Telnet port is exposed or insufficiently segmented. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk until mitigated.

Mitigation Recommendations

1. Immediately disable the Telnet service on port 2345 if it is not required for operational purposes. 2. Restrict access to the Telnet port using firewall rules or network segmentation to limit exposure to trusted management networks only. 3. Monitor network traffic for unusual activity targeting port 2345 or signs of exploitation attempts. 4. Engage with Nepstech or authorized vendors to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. If firmware updates are not yet available, consider replacing affected devices with models from vendors with timely security support. 6. Implement network-level intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting this vulnerability. 7. Conduct regular security audits of network devices to ensure no unauthorized services are exposed. 8. Educate network administrators about the risks of exposed management interfaces and enforce strong access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c72b7ef31ef0b564193

Added to database: 2/25/2026, 9:41:06 PM

Last enriched: 2/26/2026, 5:25:26 AM

Last updated: 2/26/2026, 8:03:27 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats