Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48459: n/a

0
High
VulnerabilityCVE-2024-48459cvecve-2024-48459
Published: Fri Oct 25 2024 (10/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:30:17 UTC

Technical Analysis

CVE-2024-48459 is a high-severity command injection vulnerability affecting the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. The affected firmware versions include DI_7003G-19.12.24A1V16.03.29.50 and related builds. The vulnerability arises from improper input validation that allows an attacker to craft malicious payloads capable of executing arbitrary OS commands on the router. Exploitation does not require user interaction but does require the attacker to have local or adjacent network access with low privileges (PR:L). Successful exploitation grants the attacker shell access with the highest privileges on the router’s file system, enabling full control over device configuration and potentially the network traffic passing through it. The CVSS v3.1 base score is 7.3, reflecting high confidentiality and integrity impacts but no availability impact. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via Wi-Fi or VPN. No known public exploits or patches are currently available, increasing the urgency for defensive measures. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), a common and dangerous class of injection flaws. Given the router’s role as a network gateway, compromise can lead to broader network infiltration, data interception, or persistent backdoors.

Potential Impact

The primary impact of CVE-2024-48459 is unauthorized command execution on the AX2 Pro router, leading to full compromise of the device. Attackers gaining shell access can alter router configurations, disable security controls, intercept or redirect network traffic, and establish persistent footholds. This threatens the confidentiality and integrity of all data traversing the router, including sensitive personal or corporate information. Although availability is not directly impacted, attackers could leverage the device to launch further attacks or pivot into internal networks. Organizations relying on these routers for home or small office networks face risks of espionage, data theft, and network disruption. The vulnerability’s exploitation could also facilitate lateral movement within corporate environments if these devices are connected to internal networks. The lack of available patches or exploits in the wild means attackers might develop weaponized exploits rapidly, increasing risk over time.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interfaces by limiting connections to trusted IP addresses and disabling remote management if not required. 2. Segment the network to isolate the router management interface from general user networks, reducing attacker access scope. 3. Monitor network traffic and router logs for unusual command execution attempts or unauthorized access patterns. 4. Disable any unnecessary services or features on the router that could be leveraged for exploitation. 5. Regularly check Shenzhen Tenda’s official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. Consider replacing affected routers with models from vendors with robust security track records if patches are delayed. 7. Educate users about the risks of connecting untrusted devices to the network and enforce strong Wi-Fi security to prevent unauthorized local access. 8. Employ network intrusion detection systems (NIDS) capable of detecting command injection or suspicious shell activity patterns.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b72b7ef31ef0b555803

Added to database: 2/25/2026, 9:36:50 PM

Last enriched: 2/27/2026, 9:30:17 PM

Last updated: 4/11/2026, 6:44:28 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses