Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46658: n/a

0
High
VulnerabilityCVE-2024-46658cvecve-2024-46658
Published: Thu Oct 03 2024 (10/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Syrotech SY-GOPON-8OLT-L3 v1.6.0_240629 was discovered to contain an authenticated command injection vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:31:00 UTC

Technical Analysis

CVE-2024-46658 identifies an authenticated command injection vulnerability in the Syrotech SY-GOPON-8OLT-L3 device, version 1.6.0_240629. Command injection (CWE-78) occurs when an attacker can inject and execute arbitrary operating system commands through a vulnerable interface. In this case, the vulnerability requires the attacker to have valid credentials (low privilege requirement) but does not require user interaction. The attack vector is adjacent network, meaning the attacker must have network access close to the device, such as within the same LAN or VPN. The vulnerability impacts confidentiality, integrity, and availability severely, as arbitrary commands can lead to data theft, system manipulation, or denial of service. The CVSS v3.1 vector (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates low attack complexity, no user interaction, and high impact on all security properties. No patches or exploits are currently publicly available, but the device’s role in network infrastructure makes this a critical concern. The lack of patch links suggests that vendors have not yet released a fix, increasing the urgency for defensive measures.

Potential Impact

The vulnerability allows authenticated attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise. This can result in unauthorized data access, manipulation or destruction of data, disruption of network services, and pivoting to other network assets. Given that the device is a network infrastructure component (likely an optical line terminal or similar), exploitation could disrupt service availability for multiple users or customers. The high severity and broad impact on confidentiality, integrity, and availability make this a critical risk for organizations relying on this hardware. Attackers gaining control could also establish persistent access or use the device as a launch point for further attacks within the network. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability’s characteristics make it a prime target once exploit code becomes available.

Mitigation Recommendations

1. Restrict administrative access to the Syrotech SY-GOPON-8OLT-L3 device to trusted networks and personnel only, using network segmentation and access control lists. 2. Enforce strong authentication mechanisms and regularly review user accounts to minimize the risk of credential compromise. 3. Monitor device logs and network traffic for unusual command execution patterns or unauthorized access attempts. 4. Disable or limit command interfaces that are not essential for device operation to reduce the attack surface. 5. Engage with Syrotech support or vendors to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 6. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious command injection attempts. 7. Conduct regular security assessments and penetration testing focusing on network devices to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d04b7ef31ef0b56d3ff

Added to database: 2/25/2026, 9:43:32 PM

Last enriched: 2/28/2026, 7:31:00 AM

Last updated: 4/12/2026, 3:38:17 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses