Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51004: n/a

0
Medium
VulnerabilityCVE-2024-51004cvecve-2024-51004
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51004 is a medium severity vulnerability affecting Netgear R8500 v1. 0. 2. 160 and R7000P v1. 3. 3. 154 routers. It involves multiple stack overflow flaws in the usb_device. cgi component via the cifs_user, read_access, and write_access parameters. Exploitation requires a crafted POST request and authenticated access, allowing attackers to cause a Denial of Service (DoS) without user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:15:37 UTC

Technical Analysis

CVE-2024-51004 identifies multiple stack overflow vulnerabilities in the usb_device.cgi component of Netgear R8500 v1.0.2.160 and R7000P v1.3.3.154 routers. The flaws reside in the handling of the cifs_user, read_access, and write_access parameters, which are processed via POST requests. These parameters are vulnerable to stack-based buffer overflows, categorized under CWE-120, which can be triggered by sending specially crafted POST requests to the affected CGI endpoint. Successful exploitation results in a Denial of Service (DoS) condition by crashing the device or causing it to become unresponsive. The attack vector requires authenticated access (PR:L), no user interaction (UI:N), and can be executed remotely over the network (AV:A). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. The vulnerability is rated medium severity with a CVSS 3.1 base score of 5.7, reflecting the moderate impact and exploitation complexity.

Potential Impact

The primary impact of CVE-2024-51004 is a Denial of Service on affected Netgear routers, which can disrupt network connectivity and availability for organizations relying on these devices. This can affect home users, small businesses, and enterprises using these models as part of their network infrastructure. The DoS can lead to downtime, loss of productivity, and potential cascading failures in dependent systems. Since the vulnerability requires authentication, the risk is somewhat mitigated by proper access controls, but insider threats or compromised credentials could enable exploitation. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational disruption potential. Organizations with critical network infrastructure using these routers may face significant operational risks until patches are available.

Mitigation Recommendations

1. Restrict access to the router’s management interface to trusted networks and users only, ideally via VPN or secure management VLANs. 2. Enforce strong authentication mechanisms and regularly update credentials to prevent unauthorized access. 3. Monitor router logs and network traffic for unusual POST requests targeting usb_device.cgi or related parameters. 4. Disable or limit USB-related services or features if not required, reducing the attack surface. 5. Implement network segmentation to isolate vulnerable devices from critical systems. 6. Stay alert for official patches or firmware updates from Netgear and apply them promptly once released. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts targeting this vulnerability. 8. Conduct regular security assessments and penetration tests focusing on router and network device security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba6b7ef31ef0b557834

Added to database: 2/25/2026, 9:37:42 PM

Last enriched: 2/26/2026, 1:15:37 AM

Last updated: 2/26/2026, 11:00:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats