Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46327: n/a

0
Medium
VulnerabilityCVE-2024-46327cvecve-2024-46327
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the Http_handle object of VONETS VAP11G-300 v3.3.23.6.9 allows attackers to access sensitive files via a directory traversal.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:33:45 UTC

Technical Analysis

CVE-2024-46327 identifies a directory traversal vulnerability in the Http_handle object of the VONETS VAP11G-300 wireless access point firmware version 3.3.23.6.9. Directory traversal (CWE-22) occurs when an application improperly sanitizes user-supplied input used to access files or directories, allowing attackers to navigate outside the intended directory structure. In this case, the Http_handle object fails to adequately validate file path parameters, enabling an attacker to craft requests that access sensitive files on the device's filesystem. The vulnerability requires the attacker to have local network access and some level of privileges (PR:L), but no user interaction is needed. The CVSS v3.1 score is 5.7 (medium), reflecting the moderate impact on confidentiality (C:H), with no impact on integrity or availability. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits have been reported in the wild, and no patches or mitigations have been officially released yet. The affected device, VONETS VAP11G-300, is a widely used wireless access point in small office and home environments, which may expose sensitive configuration files or credentials if exploited. This vulnerability could be leveraged to gather information useful for further attacks or unauthorized access.

Potential Impact

The primary impact of CVE-2024-46327 is unauthorized disclosure of sensitive information stored on the vulnerable device. Attackers exploiting this flaw can read configuration files, credentials, or other sensitive data, potentially compromising network security. While the vulnerability does not directly affect device integrity or availability, the leaked information could facilitate subsequent attacks such as network intrusion or lateral movement. Organizations relying on VONETS VAP11G-300 devices in their network infrastructure, especially in small office or home office (SOHO) environments, face increased risk of data exposure. Since exploitation requires local network access and some privileges, the threat is more significant in environments with weak network segmentation or where attackers can gain initial foothold. The absence of known exploits in the wild reduces immediate risk, but the lack of patches means the vulnerability remains exploitable. Overall, the vulnerability could undermine confidentiality and trust in network devices, leading to potential data breaches and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2024-46327, organizations should first restrict access to the management interface of VONETS VAP11G-300 devices to trusted network segments and authenticated users only, minimizing exposure to potential attackers. Network segmentation should be enforced to isolate vulnerable devices from untrusted or guest networks. Monitoring network traffic for unusual HTTP requests targeting the device may help detect exploitation attempts. Since no official patches are currently available, consider disabling remote management features or limiting management protocols to secure channels such as VPNs or SSH tunnels. Regularly check vendor communications and security advisories for firmware updates addressing this vulnerability. If possible, replace vulnerable devices with models that have confirmed security updates or stronger security controls. Additionally, implement strong authentication mechanisms and change default credentials to reduce the risk of unauthorized access. Conduct periodic security assessments of network devices to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56ab3a

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/26/2026, 8:33:45 AM

Last updated: 4/12/2026, 7:53:43 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses