Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42657: n/a

0
High
VulnerabilityCVE-2024-42657cvecve-2024-42657
Published: Mon Aug 19 2024 (08/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:08:57 UTC

Technical Analysis

CVE-2024-42657 identifies a vulnerability in the wishnet Nepstech Wifi Router NTPL-XPON1GFEVN version 1.0, where the login process transmits sensitive information without encryption. This flaw allows a remote attacker to capture sensitive data, such as usernames and passwords, by intercepting network traffic during the authentication phase. The vulnerability is remotely exploitable without requiring any privileges or user interaction, making it accessible to attackers positioned on the same network segment or capable of intercepting traffic en route. The vulnerability is categorized under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 7.5, indicating a high severity level primarily due to the high confidentiality impact and the ease of exploitation (attack vector network, low complexity, no privileges required, no user interaction). There is no indication of integrity or availability impact. No patches or updates have been published yet, and no active exploits have been reported. The lack of encryption during login suggests that the router either uses plaintext transmission or weak protection mechanisms, making it vulnerable to passive eavesdropping or man-in-the-middle attacks. This vulnerability could be leveraged to gain unauthorized access to the router’s administrative interface or network, potentially leading to further compromise.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality, as attackers can intercept sensitive login credentials remotely without authentication or user interaction. This can lead to unauthorized access to the router’s administrative functions, enabling attackers to alter configurations, redirect traffic, or launch further attacks within the network. Organizations relying on this router model may face increased risks of network intrusion, data interception, and potential lateral movement within their infrastructure. The absence of encryption during login also undermines trust in the device’s security posture, potentially exposing sensitive organizational or customer data. Although no integrity or availability impacts are directly associated, the breach of confidentiality alone can facilitate more severe downstream attacks. The lack of patches exacerbates the risk, as affected entities remain exposed until mitigations or device replacements are implemented. This vulnerability is particularly critical in environments where sensitive data is transmitted or where network segmentation is weak, increasing the likelihood of attacker presence on the network.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement network-level mitigations to reduce exposure. These include segmenting the network to isolate the affected router from untrusted networks, deploying encrypted VPN tunnels for remote management, and using network monitoring tools to detect suspicious traffic patterns indicative of credential interception. Disabling remote management interfaces or restricting access to trusted IP addresses can limit attack vectors. If possible, replacing the affected router model with a device that enforces encrypted authentication protocols (e.g., HTTPS, SSH) is strongly recommended. Additionally, educating users and administrators about the risks of unencrypted logins and enforcing strong, unique passwords can reduce the impact of credential compromise. Organizations should also monitor for any emerging exploits or vendor advisories and apply patches promptly once available. Employing intrusion detection systems (IDS) capable of identifying man-in-the-middle or sniffing activities can provide early warning of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc8b7ef31ef0b569032

Added to database: 2/25/2026, 9:42:32 PM

Last enriched: 2/28/2026, 6:08:57 AM

Last updated: 4/12/2026, 5:06:50 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses