Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45261: n/a

0
High
VulnerabilityCVE-2024-45261cvecve-2024-45261
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:56:36 UTC

Technical Analysis

CVE-2024-45261 is a critical authentication bypass vulnerability found in several GL-iNet router models (MT6000, MT3000, MT2500, AXT1800, AX1800) running firmware version 4.6.2. The root cause is improper binding of the Session ID (SID) to the authenticated user. Normally, a SID should uniquely identify a session for a specific user, preventing reuse by others. However, in this case, the SID generation mechanism does not enforce this binding, allowing an attacker to reuse or forge valid SIDs for other users. This flaw effectively bypasses authentication controls, enabling attackers with low privileges to escalate their access rights to full administrative control over the device. The vulnerability is remotely exploitable over the network (attack vector: adjacent network) with low complexity and no user interaction required. The impact includes full compromise of device confidentiality, integrity, and availability, enabling attackers to manipulate device settings, intercept or redirect network traffic, and potentially pivot to internal networks. The vulnerability is classified under CWE-863 (Incorrect Authorization). Although no public exploits are known at this time, the high CVSS score (8.0) reflects the serious risk posed by this flaw. No patches have been linked yet, so mitigation relies on network controls and monitoring until vendor fixes are released.

Potential Impact

The vulnerability allows attackers to bypass authentication and escalate privileges on affected GL-iNet devices, leading to full administrative control. This compromises device confidentiality, allowing exposure of sensitive configuration and network data. Integrity is impacted as attackers can alter device settings, firmware, and routing rules. Availability can be disrupted by attackers disabling or misconfiguring the device. Since these devices often serve as network gateways or Wi-Fi routers, compromise can lead to interception or redirection of network traffic, enabling further attacks on connected systems. Organizations relying on these devices for secure network access, especially in small to medium enterprises or branch offices, face significant risk of network intrusion, data theft, and lateral movement. The vulnerability’s remote exploitability and lack of user interaction requirement increase the likelihood of automated or targeted attacks once exploit code becomes available.

Mitigation Recommendations

1. Monitor GL-iNet vendor communications closely for official patches or firmware updates addressing CVE-2024-45261 and apply them immediately upon release. 2. Until patches are available, restrict network access to affected devices by implementing strict firewall rules limiting management interface exposure to trusted networks only. 3. Employ network segmentation to isolate GL-iNet devices from critical infrastructure and sensitive data environments. 4. Enable and review device logs and network traffic monitoring to detect unusual authentication attempts or session reuse patterns indicative of SID misuse. 5. Consider deploying multi-factor authentication (MFA) if supported by the device firmware to add an additional layer of authentication security. 6. Regularly audit device configurations and user accounts to identify unauthorized changes or privilege escalations. 7. If possible, temporarily disable remote management features or restrict them to VPN access to reduce attack surface. 8. Educate network administrators on the risks and signs of exploitation related to this vulnerability to improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cecb7ef31ef0b56a3bc

Added to database: 2/25/2026, 9:43:08 PM

Last enriched: 2/28/2026, 6:56:36 AM

Last updated: 4/12/2026, 9:10:50 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses