CVE-2024-45416: n/a
CVE-2024-45416 is a high-severity local file inclusion vulnerability in the HTTPD binary of multiple ZTE routers. The vulnerability arises from the session_init function, which executes all files in the /var/lua_session directory without validating their legitimacy. An attacker who can write a malicious file to this directory can achieve remote code execution (RCE) with root privileges. Exploitation requires the ability to write files to the session directory, which may be possible through other vulnerabilities or misconfigurations. The CVSS score is 8. 1, indicating a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using affected ZTE routers should prioritize mitigation to prevent potential compromise. This vulnerability poses significant risks to network infrastructure, especially in environments relying on these routers for critical communications.
AI Analysis
Technical Summary
CVE-2024-45416 is a local file inclusion vulnerability found in the HTTPD binary of multiple ZTE router models. The root cause is in the session_init function, which manages session files stored in the /var/lua_session directory. This function iterates over all files in this directory and executes them using the Lua 'dofile' function without verifying if the files are legitimate session files. This lack of validation allows an attacker who can write arbitrary files into this directory to execute malicious Lua scripts with root privileges, resulting in remote code execution (RCE) as the root user. The vulnerability is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere). Exploitation requires the attacker to have the capability to write files into the session directory, which might be achieved through other vulnerabilities or misconfigurations such as weak authentication, exposed management interfaces, or insecure file upload mechanisms. The CVSS v3.1 base score is 8.1, reflecting high impact and network attack vector, but with high attack complexity and no privileges or user interaction required. No patches or exploits are currently publicly available, but the vulnerability's nature and impact make it a critical concern for affected organizations. The vulnerability affects multiple ZTE router models, commonly deployed in enterprise and ISP networks, making it a significant threat to network infrastructure security.
Potential Impact
The impact of CVE-2024-45416 is severe due to the potential for full system compromise with root privileges on affected ZTE routers. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to complete control over the router. This can result in interception or manipulation of network traffic, disruption of network services, creation of persistent backdoors, and lateral movement within the network. Confidentiality, integrity, and availability of network communications are all at risk. Organizations relying on these routers for critical infrastructure, including ISPs, enterprises, and government agencies, may face significant operational disruptions and data breaches. The high CVSS score reflects the broad scope and critical nature of the vulnerability. Although no known exploits are currently reported in the wild, the ease of exploitation once write access is obtained and the high privileges gained make this a critical threat to address promptly.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting write access to the /var/lua_session directory to trusted processes only, preventing unauthorized file creation. 2. Network administrators should audit and harden router management interfaces, disabling any unnecessary services and enforcing strong authentication and access controls to reduce the risk of attackers gaining file write capabilities. 3. Monitor router logs and file system changes in the session directory for suspicious activity indicative of exploitation attempts. 4. If possible, isolate affected routers from untrusted networks and limit administrative access to secure management VLANs or VPNs. 5. Engage with ZTE support or vendor channels to obtain patches or firmware updates addressing this vulnerability as they become available. 6. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous behavior related to this vulnerability. 7. Conduct regular security assessments and penetration tests focusing on router configurations and potential privilege escalation paths. 8. Consider deploying compensating controls such as application whitelisting or runtime application self-protection (RASP) on network devices where feasible.
Affected Countries
China, United States, India, Brazil, Russia, Germany, United Kingdom, France, South Africa, Australia, Japan, South Korea, Mexico, Italy
CVE-2024-45416: n/a
Description
CVE-2024-45416 is a high-severity local file inclusion vulnerability in the HTTPD binary of multiple ZTE routers. The vulnerability arises from the session_init function, which executes all files in the /var/lua_session directory without validating their legitimacy. An attacker who can write a malicious file to this directory can achieve remote code execution (RCE) with root privileges. Exploitation requires the ability to write files to the session directory, which may be possible through other vulnerabilities or misconfigurations. The CVSS score is 8. 1, indicating a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using affected ZTE routers should prioritize mitigation to prevent potential compromise. This vulnerability poses significant risks to network infrastructure, especially in environments relying on these routers for critical communications.
AI-Powered Analysis
Technical Analysis
CVE-2024-45416 is a local file inclusion vulnerability found in the HTTPD binary of multiple ZTE router models. The root cause is in the session_init function, which manages session files stored in the /var/lua_session directory. This function iterates over all files in this directory and executes them using the Lua 'dofile' function without verifying if the files are legitimate session files. This lack of validation allows an attacker who can write arbitrary files into this directory to execute malicious Lua scripts with root privileges, resulting in remote code execution (RCE) as the root user. The vulnerability is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere). Exploitation requires the attacker to have the capability to write files into the session directory, which might be achieved through other vulnerabilities or misconfigurations such as weak authentication, exposed management interfaces, or insecure file upload mechanisms. The CVSS v3.1 base score is 8.1, reflecting high impact and network attack vector, but with high attack complexity and no privileges or user interaction required. No patches or exploits are currently publicly available, but the vulnerability's nature and impact make it a critical concern for affected organizations. The vulnerability affects multiple ZTE router models, commonly deployed in enterprise and ISP networks, making it a significant threat to network infrastructure security.
Potential Impact
The impact of CVE-2024-45416 is severe due to the potential for full system compromise with root privileges on affected ZTE routers. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to complete control over the router. This can result in interception or manipulation of network traffic, disruption of network services, creation of persistent backdoors, and lateral movement within the network. Confidentiality, integrity, and availability of network communications are all at risk. Organizations relying on these routers for critical infrastructure, including ISPs, enterprises, and government agencies, may face significant operational disruptions and data breaches. The high CVSS score reflects the broad scope and critical nature of the vulnerability. Although no known exploits are currently reported in the wild, the ease of exploitation once write access is obtained and the high privileges gained make this a critical threat to address promptly.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting write access to the /var/lua_session directory to trusted processes only, preventing unauthorized file creation. 2. Network administrators should audit and harden router management interfaces, disabling any unnecessary services and enforcing strong authentication and access controls to reduce the risk of attackers gaining file write capabilities. 3. Monitor router logs and file system changes in the session directory for suspicious activity indicative of exploitation attempts. 4. If possible, isolate affected routers from untrusted networks and limit administrative access to secure management VLANs or VPNs. 5. Engage with ZTE support or vendor channels to obtain patches or firmware updates addressing this vulnerability as they become available. 6. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous behavior related to this vulnerability. 7. Conduct regular security assessments and penetration tests focusing on router configurations and potential privilege escalation paths. 8. Consider deploying compensating controls such as application whitelisting or runtime application self-protection (RASP) on network devices where feasible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cedb7ef31ef0b56a424
Added to database: 2/25/2026, 9:43:09 PM
Last enriched: 2/26/2026, 8:12:52 AM
Last updated: 2/26/2026, 9:17:24 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.