Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48455: n/a

0
Low
VulnerabilityCVE-2024-48455cvecve-2024-48455
Published: Mon Jan 06 2025 (01/06/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:29:22 UTC

Technical Analysis

CVE-2024-48455 is an information disclosure vulnerability identified in several Netis WiFi router models, including the Wifi6 Router NX10 (versions 2.0.1.3643 and 2.0.1.3582), Wifi 11AC Routers NC65, NC63, NC21, and MW5360 across various firmware versions. The vulnerability arises from improper handling of the mode_name and wl_link parameters within the skk_get.cgi component, which is part of the router's web management interface. A remote attacker with high-level privileges (authentication required) can exploit this flaw to retrieve sensitive information from the device, potentially including configuration details or network parameters. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and no user interaction (UI:N). The vulnerability does not affect the integrity or availability of the device, only confidentiality (C:L, I:N, A:N). No public exploits have been reported, and no patches are currently linked, indicating that mitigation relies on vendor updates and access control. The vulnerability's existence highlights the importance of securing administrative interfaces and limiting exposure of management services to untrusted networks.

Potential Impact

The primary impact of CVE-2024-48455 is the unauthorized disclosure of sensitive information from affected Netis routers. While the vulnerability does not allow direct control or disruption of the device, leaked information could facilitate further attacks such as credential theft, network reconnaissance, or targeted exploitation of other vulnerabilities. Organizations relying on these routers for critical network infrastructure may face increased risk of lateral movement or data breaches if attackers leverage disclosed information. The requirement for authenticated access reduces the likelihood of exploitation by external attackers but does not eliminate risks from insider threats or compromised credentials. The low CVSS score reflects limited impact, but in environments where these routers manage sensitive or critical networks, even minor information leaks can have cascading effects. The absence of known exploits suggests limited current threat but does not preclude future exploitation once details become more widely known.

Mitigation Recommendations

To mitigate CVE-2024-48455, organizations should implement the following specific measures: 1) Restrict administrative access to the router’s management interface by limiting it to trusted IP addresses or internal networks using access control lists or firewall rules. 2) Enforce strong authentication mechanisms and regularly update administrative credentials to prevent unauthorized access. 3) Monitor network traffic for unusual access patterns to the skk_get.cgi component or related management endpoints. 4) Disable remote management features if not required, reducing exposure to external attackers. 5) Stay informed of vendor advisories and apply firmware updates promptly once patches addressing this vulnerability are released. 6) Conduct periodic security audits of router configurations to ensure no sensitive information is unnecessarily exposed via web interfaces. 7) Segment network infrastructure to isolate critical devices and limit the impact of potential information disclosure. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive patch management tailored to the affected Netis routers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b72b7ef31ef0b5557f9

Added to database: 2/25/2026, 9:36:50 PM

Last enriched: 2/27/2026, 9:29:22 PM

Last updated: 4/11/2026, 9:11:36 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses