Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42658: n/a

0
High
VulnerabilityCVE-2024-42658cvecve-2024-42658
Published: Mon Aug 19 2024 (08/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookie's parameter

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:09:18 UTC

Technical Analysis

CVE-2024-42658 is a vulnerability identified in the wishnet Nepstech Wifi Router NTPL-XPON1GFEVN version 1.0. The issue arises from improper handling of cookie parameters, which allows a remote attacker to extract sensitive information without requiring any authentication or user interaction. The vulnerability is categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 8.8, indicating a high severity level with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over an adjacent network (such as a local network or Wi-Fi), with low attack complexity, no privileges required, and no user interaction needed. The impact affects confidentiality, integrity, and availability, suggesting that the attacker could not only access sensitive data but potentially manipulate or disrupt the router’s operations. No patches or fixes have been released at the time of publication, and no exploits have been observed in the wild. However, the nature of the vulnerability and the critical role of routers in network infrastructure make this a significant threat. The flaw could be leveraged to gain unauthorized access to network traffic, credentials, or configuration data, potentially facilitating further attacks within the network environment.

Potential Impact

The vulnerability could lead to unauthorized disclosure of sensitive information stored or processed by the affected router, including authentication cookies or session tokens. This exposure can enable attackers to hijack sessions, gain unauthorized access to network management interfaces, or intercept confidential communications. The compromise of router integrity and availability could disrupt network services, causing downtime and operational impact. Organizations relying on these routers for critical network connectivity, especially in enterprise or ISP environments, may face increased risk of data breaches, lateral movement by attackers, and service outages. The absence of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks in environments where the router is accessible over local or adjacent networks. This could affect both private and public sector networks, including government, telecommunications, and corporate infrastructures.

Mitigation Recommendations

Until an official patch is released, organizations should implement network segmentation to isolate affected routers from untrusted networks and limit access to management interfaces. Employ strict access control lists (ACLs) to restrict communication to and from the router, especially on local networks. Monitor network traffic for unusual activity or unauthorized access attempts targeting the router. Disable remote management features if not required, and ensure strong, unique credentials are used for router administration. Regularly update router firmware when patches become available and subscribe to vendor advisories for timely updates. Consider deploying network intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. For critical environments, evaluate replacing affected hardware with models from vendors with faster security response capabilities. Conduct security audits and penetration testing focused on router vulnerabilities to identify and remediate exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc8b7ef31ef0b569037

Added to database: 2/25/2026, 9:42:32 PM

Last enriched: 2/28/2026, 6:09:18 AM

Last updated: 4/12/2026, 2:37:10 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses