Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46330: n/a

0
High
VulnerabilityCVE-2024-46330cvecve-2024-46330
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

VONETS VAP11G-300 v3.3.23.6.9 was discovered to contain a command injection vulnerability via the iptablesWebsFilterRun object.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:19:09 UTC

Technical Analysis

CVE-2024-46330 is a command injection vulnerability identified in the VONETS VAP11G-300 wireless access point firmware version 3.3.23.6.9. The vulnerability resides in the iptablesWebsFilterRun object, which is part of the device's web management interface responsible for configuring firewall rules. An attacker with low-level privileges and authenticated access can exploit this flaw by injecting malicious commands through the vulnerable interface, leading to arbitrary command execution on the underlying operating system. The vulnerability is classified under CWE-78, indicating improper neutralization of special elements in OS commands, which allows attackers to manipulate system commands. The CVSS v3.1 score of 7.4 reflects a high severity due to the potential for complete compromise of confidentiality, integrity, and availability. The attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L), low privileges (PR:L), and user interaction (UI:R). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No patches or public exploits are currently available, increasing the urgency for organizations to implement compensating controls. Given the device’s role as a wireless access point, successful exploitation could allow attackers to gain control over network traffic, disrupt services, or pivot to other internal systems.

Potential Impact

The impact of CVE-2024-46330 is significant for organizations using VONETS VAP11G-300 devices. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands with the privileges of the vulnerable service. This can result in unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and potential lateral movement within the network. The availability of the wireless access point can be disrupted, causing network outages or degraded performance. Confidential information passing through the device could be exposed or altered. Since the vulnerability requires authentication and user interaction, insider threats or social engineering attacks could facilitate exploitation. The absence of patches means organizations must rely on network segmentation and access controls to mitigate risk. The widespread use of such devices in small to medium enterprises and some industrial environments increases the potential attack surface globally.

Mitigation Recommendations

To mitigate CVE-2024-46330, organizations should first restrict access to the VONETS VAP11G-300 management interface by limiting it to trusted IP addresses and using strong authentication mechanisms. Disable remote management if not required. Monitor device logs and network traffic for unusual command execution patterns or unauthorized access attempts. Implement network segmentation to isolate vulnerable devices from critical infrastructure. Employ intrusion detection systems capable of recognizing command injection attempts targeting iptables or similar firewall configurations. Until an official patch is released, consider replacing vulnerable devices with alternatives from vendors with timely security updates. Educate users and administrators about the risks of social engineering that could lead to the required user interaction for exploitation. Regularly audit device firmware versions and configurations to ensure compliance with security best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56ab8d

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/28/2026, 7:19:09 AM

Last updated: 4/12/2026, 5:09:21 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses