Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45263: n/a

0
High
VulnerabilityCVE-2024-45263cvecve-2024-45263
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:57:05 UTC

Technical Analysis

CVE-2024-45263 is a vulnerability identified in several GL-iNet router models (MT6000, MT3000, MT2500, AXT1800, AX1800) running firmware version 4.6.2. The core issue lies in the device's upload interface, which allows unauthenticated attackers to upload arbitrary files to the device. This unrestricted file upload vulnerability is categorized under CWE-434, indicating that the system fails to properly restrict the types of files that can be uploaded, thereby permitting potentially dangerous files to be placed on the device. Once uploaded, these files can be executed by the device, enabling attackers to leak sensitive information and gain complete control over the router. The vulnerability requires no privileges or user interaction, and can be exploited remotely over the network, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). The CVSS score of 8.8 (high severity) reflects the significant impact on confidentiality, integrity, and availability, combined with the low complexity of exploitation. No patches or mitigations have been officially released at the time of publication, and no known exploits are reported in the wild. This vulnerability poses a serious risk to organizations and individuals relying on affected GL-iNet devices for network connectivity and security.

Potential Impact

The exploitation of CVE-2024-45263 can have severe consequences for organizations worldwide. Attackers gaining arbitrary file upload and execution capabilities on GL-iNet routers can lead to full device compromise, allowing them to intercept, modify, or redirect network traffic. This can result in the leakage of sensitive information such as credentials, internal communications, and configuration data. The integrity of the network can be undermined by installing persistent backdoors or malware, enabling long-term espionage or sabotage. Availability may also be impacted if attackers disrupt device functionality or launch denial-of-service conditions. Given that these routers are often deployed in both enterprise and consumer environments, the scope of impact ranges from individual privacy violations to large-scale breaches affecting corporate networks. The lack of authentication and user interaction requirements increases the risk of automated exploitation campaigns. Organizations using these devices in critical infrastructure, remote offices, or IoT gateways face heightened risks of operational disruption and data loss.

Mitigation Recommendations

To mitigate CVE-2024-45263, organizations should immediately restrict network access to the upload interface of affected GL-iNet devices, ideally by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. Monitoring network traffic for unusual upload attempts or unexpected file transfers to the device can help detect exploitation attempts early. Administrators should disable any unnecessary upload functionalities if configurable. Since no official patches are currently available, contacting GL-iNet support for guidance and monitoring their advisories for firmware updates is critical. Applying firmware updates promptly once released is essential to remediate the vulnerability. Additionally, implementing strong network access controls, such as VPNs or multi-factor authentication for device management, can reduce the attack surface. Regularly auditing device configurations and logs for anomalies will aid in early detection of compromise. Organizations should also consider replacing affected devices with models that have confirmed secure firmware if mitigation is not feasible in the short term.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cecb7ef31ef0b56a3c2

Added to database: 2/25/2026, 9:43:08 PM

Last enriched: 2/28/2026, 6:57:05 AM

Last updated: 4/11/2026, 5:16:35 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses