Skip to main content

CVE-2024-40113: n/a in n/a

Medium
VulnerabilityCVE-2024-40113cvecve-2024-40113
Published: Mon Jun 02 2025 (06/02/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Sitecom WLX-2006 Wall Mount Range Extender N300 v.1.5 and before is vulnerable to Use of Default Credentials.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:41:16 UTC

Technical Analysis

CVE-2024-40113 identifies a vulnerability in the Sitecom WLX-2006 Wall Mount Range Extender N300, version 1.5 and earlier. The vulnerability is classified as a Use of Default Credentials issue (CWE-1392), meaning that the device ships with default login credentials that have not been changed or enforced to be changed by the user. This allows an attacker to gain unauthorized access to the device remotely over the network without requiring any authentication or user interaction. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). Because the device is a wireless range extender, unauthorized access could allow an attacker to intercept, manipulate, or redirect network traffic passing through the device, potentially compromising sensitive data confidentiality and integrity. However, the vulnerability does not directly allow denial of service or full system compromise. No patches or fixes are currently linked, and no known exploits are reported in the wild as of the publication date. The vulnerability is significant because default credentials are a common and easily exploitable weakness, especially in network infrastructure devices that are often overlooked for security hardening. Attackers can scan for exposed devices and attempt login with default credentials, gaining control over the device's configuration and network traffic. This could facilitate further attacks such as man-in-the-middle, network reconnaissance, or lateral movement within a network.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to small and medium enterprises or home office environments that deploy Sitecom WLX-2006 range extenders without changing default credentials. Compromise of these devices could lead to unauthorized network access, interception of sensitive communications, and potential data leakage. In sectors with strict data protection regulations such as GDPR, unauthorized access to network devices could result in compliance violations and reputational damage. Critical infrastructure or organizations relying on secure wireless connectivity may face increased risk of targeted attacks leveraging compromised range extenders as footholds. However, the impact is somewhat limited by the device type and the requirement that the attacker can reach the device over the network. Enterprises with robust network segmentation and monitoring may mitigate the risk. Nonetheless, the ease of exploitation and the potential to undermine network confidentiality and integrity make this a relevant threat to European organizations using this hardware.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their network for the presence of Sitecom WLX-2006 range extenders, especially version 1.5 and earlier. Specific steps include: 1) Change all default credentials on these devices to strong, unique passwords to prevent unauthorized access. 2) If possible, upgrade the device firmware to a version that addresses this vulnerability or consider replacing the device with a more secure model. 3) Implement network segmentation to isolate wireless extenders from critical network segments, limiting the impact of a compromised device. 4) Monitor network traffic for unusual activity originating from or directed to these devices. 5) Disable remote management features if not required, or restrict management access to trusted IP addresses only. 6) Educate IT staff and end users about the risks of default credentials and enforce policies to change them upon deployment. 7) Regularly review and update device inventories and configurations as part of vulnerability management processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a04cb

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:41:16 PM

Last updated: 8/13/2025, 1:11:21 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats