Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41285: n/a

0
Critical
VulnerabilityCVE-2024-41285cvecve-2024-41285
Published: Mon Aug 26 2024 (08/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 06:56:51 UTC

Technical Analysis

CVE-2024-41285 is a stack overflow vulnerability identified in the FAST FW300R firmware version 1.3.13 Build 141023 Rel.61347n. The vulnerability arises from improper handling of crafted file path inputs, which leads to a stack-based buffer overflow (CWE-120). This flaw allows an unauthenticated remote attacker to execute arbitrary code on the device or cause a Denial of Service (DoS) condition by crashing the system. The vulnerability is remotely exploitable over the network without requiring user interaction, making it highly dangerous. The CVSS v3.1 base score is 9.8, reflecting its critical impact on confidentiality, integrity, and availability. The affected device is likely a network appliance or embedded system, given the firmware naming convention. No patches or official mitigations have been released at the time of publication, and no known exploits are currently in the wild. The vulnerability’s exploitation could lead to full system compromise, allowing attackers to control the device, intercept or manipulate data, or disrupt network services. Given the severity and ease of exploitation, organizations using this firmware should consider immediate risk assessment and containment strategies.

Potential Impact

The impact of CVE-2024-41285 is severe for organizations deploying FAST FW300R devices. Successful exploitation can lead to complete system compromise, enabling attackers to execute arbitrary code, which may include installing persistent malware or creating backdoors. Confidential data processed or stored on the device could be exposed or altered, undermining data integrity and privacy. The Denial of Service potential can disrupt critical network functions, leading to operational downtime and service unavailability. This can affect business continuity, especially in environments relying on these devices for network routing, security, or management. The vulnerability’s remote, unauthenticated exploit vector increases the risk of widespread attacks, including automated scanning and exploitation attempts. Organizations in sectors such as telecommunications, critical infrastructure, and enterprises with extensive network equipment deployments are particularly vulnerable. The absence of patches increases the window of exposure, potentially inviting threat actors to develop exploits rapidly.

Mitigation Recommendations

Given the lack of official patches, organizations should implement immediate compensating controls. First, restrict network access to the FAST FW300R devices by applying strict firewall rules, allowing only trusted management IPs to communicate with the device. Disable any unnecessary services or interfaces that could be exploited remotely. Employ network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data environments. Monitor network traffic for unusual file path requests or anomalous activity targeting the device. Use intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. Regularly audit device configurations and logs for signs of compromise. Engage with the vendor for any available firmware updates or security advisories. Plan for a timely firmware upgrade or device replacement once a patch is released. Additionally, consider deploying endpoint detection and response (EDR) solutions on connected systems to detect lateral movement or post-exploitation activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb5b7ef31ef0b568360

Added to database: 2/25/2026, 9:42:13 PM

Last enriched: 2/26/2026, 6:56:51 AM

Last updated: 4/12/2026, 7:54:36 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses