Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51027: n/a

0
Medium
VulnerabilityCVE-2024-51027cvecve-2024-51027
Published: Wed Nov 13 2024 (11/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51027 is a medium severity vulnerability affecting the Ruijie NBR800G gateway running NBR_RGOS_11. 1(6)B4P9. It allows unauthenticated remote attackers to execute commands via the 'province' parameter in the /itbox_pi/networksafe. php endpoint. The vulnerability is categorized as CWE-77 (Improper Neutralization of Special Elements used in a Command). Exploitation requires network access but no privileges or user interaction. While no known exploits are currently in the wild, successful exploitation can cause denial of service by impacting availability. No patches have been published yet. Organizations using this gateway should prioritize monitoring and network segmentation to reduce exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:18:44 UTC

Technical Analysis

CVE-2024-51027 is a command injection vulnerability identified in the Ruijie NBR800G gateway firmware version NBR_RGOS_11.1(6)B4P9. The vulnerability resides in the /itbox_pi/networksafe.php web interface, specifically in the handling of the 'province' parameter. Due to insufficient input validation or sanitization, an attacker can inject arbitrary system commands through this parameter, leading to command execution on the device. The vulnerability is classified under CWE-77, indicating improper neutralization of special elements used in OS commands. The CVSS v3.1 base score is 6.5, reflecting a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). This suggests that exploitation could disrupt device operation, potentially causing denial of service. No authenticated access is needed, increasing the risk if the device is reachable by attackers. No patches or mitigations have been officially released at the time of publication (November 13, 2024). The absence of known exploits in the wild indicates this is a recently disclosed vulnerability. The Ruijie NBR800G gateway is typically deployed in enterprise and ISP environments, making affected devices critical network infrastructure components.

Potential Impact

The primary impact of CVE-2024-51027 is on the availability of the Ruijie NBR800G gateway devices. Successful exploitation allows remote attackers to execute arbitrary commands without authentication, which can lead to device crashes, service interruptions, or persistent denial of service conditions. This can disrupt network connectivity and critical services relying on the gateway, affecting business operations and potentially causing significant downtime. Although confidentiality and integrity are not directly impacted, the loss of availability in network gateways can have cascading effects on organizational security posture and operational continuity. Enterprises and ISPs using these gateways may face increased risk of network outages or targeted attacks exploiting this vulnerability. The lack of known exploits currently reduces immediate risk, but the ease of exploitation and no requirement for authentication make it a significant concern once exploit code becomes available.

Mitigation Recommendations

1. Network Segmentation: Restrict access to the management interface of the Ruijie NBR800G gateway to trusted internal networks only, preventing exposure to adjacent or external attackers. 2. Access Controls: Implement strict firewall rules and access control lists (ACLs) to limit who can reach the /itbox_pi/networksafe.php endpoint. 3. Monitoring and Logging: Enable detailed logging on the gateway and monitor for unusual requests targeting the 'province' parameter or other suspicious activity indicative of command injection attempts. 4. Vendor Coordination: Engage with Ruijie Networks to obtain official patches or firmware updates addressing this vulnerability as soon as they are released. 5. Temporary Workarounds: If possible, disable or restrict the vulnerable web interface or parameter until a patch is available. 6. Incident Response Preparedness: Prepare to isolate affected devices quickly in case of suspected exploitation to minimize impact. 7. Regular Firmware Audits: Maintain an inventory of device firmware versions and ensure timely updates once fixes are available. These steps go beyond generic advice by focusing on limiting exposure of the vulnerable interface and proactive detection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba8b7ef31ef0b55793f

Added to database: 2/25/2026, 9:37:44 PM

Last enriched: 2/26/2026, 1:18:44 AM

Last updated: 2/26/2026, 8:04:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats