CVE-2024-45414: n/a
The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in webPrivateDecrypt function. This function is responsible for decrypting RSA encrypted ciphertext, the encrypted data is supplied base64 encoded. The decoded ciphertext is stored on the stack without checking its length. An unauthenticated attacker can get RCE as root by exploiting this vulnerability.
AI Analysis
Technical Summary
CVE-2024-45414 is a stack-based buffer overflow vulnerability identified in the HTTPD binary of multiple ZTE router models. The vulnerability is located in the webPrivateDecrypt function, which handles the decryption of RSA-encrypted ciphertext that is base64 encoded. When the ciphertext is decoded, it is stored on the stack without any bounds checking on its length, leading to a classic stack buffer overflow condition (CWE-121). This unchecked buffer allows an attacker to overwrite the stack, potentially corrupting the return address or other control data. Because the vulnerable function processes unauthenticated input, an attacker can remotely send specially crafted requests to the HTTPD service to exploit this flaw. Exploitation results in remote code execution with root privileges, granting full control over the affected device. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no public patches or exploits are currently available, the severity and ease of exploitation make this a high-risk vulnerability for organizations using ZTE routers. The lack of authentication and the root-level RCE potential make this vulnerability particularly dangerous for network infrastructure security.
Potential Impact
The impact of CVE-2024-45414 is severe for organizations worldwide that deploy affected ZTE routers in their network infrastructure. Successful exploitation allows attackers to gain root-level remote code execution, enabling full device compromise. This can lead to unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and potential pivoting to other internal systems. The confidentiality, integrity, and availability of network communications and connected systems are at significant risk. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker with network access to the device's HTTPD service, increasing the attack surface. Critical infrastructure, enterprises, and service providers relying on ZTE routers may face operational disruptions, data breaches, and loss of trust. The absence of known exploits in the wild currently provides a limited window for proactive mitigation before potential weaponization.
Mitigation Recommendations
Organizations should immediately identify and inventory all ZTE routers in their environment to determine exposure. Network segmentation and firewall rules should be applied to restrict access to the HTTPD management interface, limiting it to trusted administrative networks only. Where possible, disable remote management interfaces or restrict them via VPN or secure channels. Monitor network traffic for anomalous or suspicious requests targeting the HTTPD service. Since no official patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block exploit attempts targeting this vulnerability. Engage with ZTE support channels to obtain information on forthcoming patches or firmware updates. Plan for rapid deployment of security updates once released. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises. Avoid exposing affected devices directly to the internet until patched.
Affected Countries
China, India, Brazil, Russia, United States, Germany, United Kingdom, South Africa, United Arab Emirates, Saudi Arabia
CVE-2024-45414: n/a
Description
The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in webPrivateDecrypt function. This function is responsible for decrypting RSA encrypted ciphertext, the encrypted data is supplied base64 encoded. The decoded ciphertext is stored on the stack without checking its length. An unauthenticated attacker can get RCE as root by exploiting this vulnerability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45414 is a stack-based buffer overflow vulnerability identified in the HTTPD binary of multiple ZTE router models. The vulnerability is located in the webPrivateDecrypt function, which handles the decryption of RSA-encrypted ciphertext that is base64 encoded. When the ciphertext is decoded, it is stored on the stack without any bounds checking on its length, leading to a classic stack buffer overflow condition (CWE-121). This unchecked buffer allows an attacker to overwrite the stack, potentially corrupting the return address or other control data. Because the vulnerable function processes unauthenticated input, an attacker can remotely send specially crafted requests to the HTTPD service to exploit this flaw. Exploitation results in remote code execution with root privileges, granting full control over the affected device. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no public patches or exploits are currently available, the severity and ease of exploitation make this a high-risk vulnerability for organizations using ZTE routers. The lack of authentication and the root-level RCE potential make this vulnerability particularly dangerous for network infrastructure security.
Potential Impact
The impact of CVE-2024-45414 is severe for organizations worldwide that deploy affected ZTE routers in their network infrastructure. Successful exploitation allows attackers to gain root-level remote code execution, enabling full device compromise. This can lead to unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and potential pivoting to other internal systems. The confidentiality, integrity, and availability of network communications and connected systems are at significant risk. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker with network access to the device's HTTPD service, increasing the attack surface. Critical infrastructure, enterprises, and service providers relying on ZTE routers may face operational disruptions, data breaches, and loss of trust. The absence of known exploits in the wild currently provides a limited window for proactive mitigation before potential weaponization.
Mitigation Recommendations
Organizations should immediately identify and inventory all ZTE routers in their environment to determine exposure. Network segmentation and firewall rules should be applied to restrict access to the HTTPD management interface, limiting it to trusted administrative networks only. Where possible, disable remote management interfaces or restrict them via VPN or secure channels. Monitor network traffic for anomalous or suspicious requests targeting the HTTPD service. Since no official patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block exploit attempts targeting this vulnerability. Engage with ZTE support channels to obtain information on forthcoming patches or firmware updates. Plan for rapid deployment of security updates once released. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises. Avoid exposing affected devices directly to the internet until patched.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cecb7ef31ef0b56a3d5
Added to database: 2/25/2026, 9:43:08 PM
Last enriched: 2/28/2026, 6:58:03 AM
Last updated: 4/12/2026, 3:30:45 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.