Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48747: n/a

0
Medium
VulnerabilityCVE-2024-48747cvecve-2024-48747
Published: Thu Nov 21 2024 (11/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-48747 is a medium severity vulnerability in alist-tvbox v1. 7. 1 that allows remote attackers with high privileges and user interaction to execute arbitrary code via the /atv-cli file. The vulnerability is related to command injection (CWE-77) and requires authentication and user interaction to exploit. Although no known exploits are currently in the wild and no patches have been published, successful exploitation could lead to full compromise of confidentiality, integrity, and availability of affected systems. Organizations using alist-tvbox should be cautious and monitor for updates or mitigations. The vulnerability affects network-exposed devices, increasing risk in environments where these devices are deployed. Countries with significant deployment of alist-tvbox or similar IoT devices, especially in Asia and North America, are likely at higher risk. Immediate mitigation involves restricting access to the /atv-cli endpoint, applying strict input validation, and monitoring for suspicious activity. Given the CVSS score of 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:15:41 UTC

Technical Analysis

CVE-2024-48747 is a vulnerability identified in alist-tvbox version 1.7.1 that permits a remote attacker to execute arbitrary code through the /atv-cli file. The vulnerability is classified under CWE-77, indicating a command injection flaw. This means that the application improperly sanitizes or validates input passed to system commands, allowing an attacker to inject malicious commands. Exploitation requires the attacker to have high privileges (PR:H) and user interaction (UI:R), suggesting that the attacker must authenticate and trick a user into triggering the exploit. The attack vector is network-based (AV:N), meaning the attacker can exploit the vulnerability remotely over the network. The CVSS v3.1 base score is 6.8, reflecting medium severity, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits are currently available, but the vulnerability’s presence in a network-exposed device like alist-tvbox poses a significant risk. The lack of affected versions specified suggests the vulnerability may impact all or multiple versions around v1.7.1. The vulnerability’s exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to full system compromise, data theft, or disruption of service. The /atv-cli endpoint is the attack surface, and securing or disabling this interface is critical. The vulnerability was reserved in early October 2024 and published in November 2024, indicating recent discovery and disclosure.

Potential Impact

The potential impact of CVE-2024-48747 is significant for organizations deploying alist-tvbox devices, particularly in environments where these devices are network-accessible. Successful exploitation could lead to arbitrary code execution, allowing attackers to take full control of the device, access sensitive data, disrupt services, or pivot to other network assets. This compromises confidentiality, integrity, and availability. Given the device’s role as a TV box, it may be used in consumer, enterprise, or industrial IoT contexts, increasing the attack surface. The requirement for authentication and user interaction reduces the ease of exploitation but does not eliminate risk, especially in environments with weak access controls or social engineering vulnerabilities. Organizations relying on alist-tvbox for media streaming or other services may face service outages or data breaches. The absence of patches increases the window of exposure. Attackers could use this vulnerability to establish persistent footholds or launch further attacks within internal networks. The impact extends to privacy violations and potential regulatory compliance issues if sensitive data is exposed.

Mitigation Recommendations

To mitigate CVE-2024-48747, organizations should immediately restrict network access to the /atv-cli endpoint by implementing firewall rules or network segmentation to limit exposure. Strong authentication mechanisms should be enforced to prevent unauthorized access. Input validation and sanitization should be applied to any commands or parameters processed by the /atv-cli interface to prevent command injection. Monitoring and logging of access to the /atv-cli file should be enabled to detect suspicious activity. Until an official patch is released, consider disabling or removing the /atv-cli functionality if it is not essential. Conduct user awareness training to reduce the risk of social engineering attacks that could facilitate user interaction exploitation. Regularly check for updates from the vendor and apply patches promptly once available. Employ intrusion detection/prevention systems (IDS/IPS) to identify attempts to exploit this vulnerability. Perform security assessments and penetration testing focused on this attack vector to identify and remediate weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b78b7ef31ef0b555b89

Added to database: 2/25/2026, 9:36:56 PM

Last enriched: 2/26/2026, 12:15:41 AM

Last updated: 2/26/2026, 6:10:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats