Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45416: n/a

0
High
VulnerabilityCVE-2024-45416cvecve-2024-45416
Published: Mon Sep 16 2024 (09/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-45416 is a high-severity local file inclusion vulnerability in the HTTPD binary of multiple ZTE routers. The vulnerability arises from the session_init function, which executes all files in the /var/lua_session directory without validating their legitimacy. An attacker who can write a malicious file to this directory can achieve remote code execution (RCE) with root privileges. Exploitation requires the ability to write files to the session directory, which may be possible through other vulnerabilities or misconfigurations. The CVSS score is 8. 1, indicating a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using affected ZTE routers should prioritize mitigation to prevent potential compromise. This vulnerability poses significant risks to network infrastructure, especially in environments relying on these routers for critical communications.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:12:52 UTC

Technical Analysis

CVE-2024-45416 is a local file inclusion vulnerability found in the HTTPD binary of multiple ZTE router models. The root cause is in the session_init function, which manages session files stored in the /var/lua_session directory. This function iterates over all files in this directory and executes them using the Lua 'dofile' function without verifying if the files are legitimate session files. This lack of validation allows an attacker who can write arbitrary files into this directory to execute malicious Lua scripts with root privileges, resulting in remote code execution (RCE) as the root user. The vulnerability is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere). Exploitation requires the attacker to have the capability to write files into the session directory, which might be achieved through other vulnerabilities or misconfigurations such as weak authentication, exposed management interfaces, or insecure file upload mechanisms. The CVSS v3.1 base score is 8.1, reflecting high impact and network attack vector, but with high attack complexity and no privileges or user interaction required. No patches or exploits are currently publicly available, but the vulnerability's nature and impact make it a critical concern for affected organizations. The vulnerability affects multiple ZTE router models, commonly deployed in enterprise and ISP networks, making it a significant threat to network infrastructure security.

Potential Impact

The impact of CVE-2024-45416 is severe due to the potential for full system compromise with root privileges on affected ZTE routers. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to complete control over the router. This can result in interception or manipulation of network traffic, disruption of network services, creation of persistent backdoors, and lateral movement within the network. Confidentiality, integrity, and availability of network communications are all at risk. Organizations relying on these routers for critical infrastructure, including ISPs, enterprises, and government agencies, may face significant operational disruptions and data breaches. The high CVSS score reflects the broad scope and critical nature of the vulnerability. Although no known exploits are currently reported in the wild, the ease of exploitation once write access is obtained and the high privileges gained make this a critical threat to address promptly.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting write access to the /var/lua_session directory to trusted processes only, preventing unauthorized file creation. 2. Network administrators should audit and harden router management interfaces, disabling any unnecessary services and enforcing strong authentication and access controls to reduce the risk of attackers gaining file write capabilities. 3. Monitor router logs and file system changes in the session directory for suspicious activity indicative of exploitation attempts. 4. If possible, isolate affected routers from untrusted networks and limit administrative access to secure management VLANs or VPNs. 5. Engage with ZTE support or vendor channels to obtain patches or firmware updates addressing this vulnerability as they become available. 6. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous behavior related to this vulnerability. 7. Conduct regular security assessments and penetration tests focusing on router configurations and potential privilege escalation paths. 8. Consider deploying compensating controls such as application whitelisting or runtime application self-protection (RASP) on network devices where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cedb7ef31ef0b56a424

Added to database: 2/25/2026, 9:43:09 PM

Last enriched: 2/26/2026, 8:12:52 AM

Last updated: 2/26/2026, 9:17:24 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats