Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51240: n/a

0
High
VulnerabilityCVE-2024-51240cvecve-2024-51240
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the luci-mod-rpc package in OpenWRT Luci LTS allows for privilege escalation from an admin account to root via the JSON-RPC-API, which is exposed by the luci-mod-rpc package

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:51:11 UTC

Technical Analysis

CVE-2024-51240 identifies a privilege escalation vulnerability within the luci-mod-rpc package of OpenWRT Luci LTS. The luci-mod-rpc package exposes a JSON-RPC API intended for remote management and automation of OpenWRT devices. The vulnerability allows an attacker who already has administrative privileges on the device to escalate those privileges to root level by exploiting insufficient access control or improper authorization checks in the JSON-RPC API implementation. The attack vector is remote and requires only low complexity, as no additional user interaction is necessary beyond having an admin account. The vulnerability affects the confidentiality, integrity, and availability of the device, as root access grants full control over the system, including the ability to modify configurations, install malicious software, or disrupt network services. The vulnerability is classified under CWE-522, which relates to insufficiently protected credentials or access controls. Although no patches or exploits are currently publicly available, the high CVSS score of 8.0 indicates a serious risk. OpenWRT is widely used in consumer and enterprise routers, IoT devices, and embedded systems, making this vulnerability relevant to a broad range of networked environments. The lack of a specified affected version suggests the issue may impact multiple or all versions of the luci-mod-rpc package in Luci LTS. The vulnerability's exploitation requires an attacker to have administrative access, which may be obtained through other means such as credential compromise or insider threat. Once exploited, the attacker gains root privileges, enabling full control over the device and potentially the network it protects.

Potential Impact

The impact of CVE-2024-51240 is significant for organizations using OpenWRT-based devices, especially those relying on Luci LTS with the luci-mod-rpc package enabled. Successful exploitation allows an attacker with admin access to escalate to root, compromising device confidentiality, integrity, and availability. This can lead to unauthorized configuration changes, installation of persistent malware, interception or manipulation of network traffic, and disruption of network services. For enterprises, this could mean compromised network perimeter devices, leading to lateral movement and further network compromise. In consumer environments, compromised routers could be used in botnets or for data exfiltration. The vulnerability's remote exploitability and lack of required user interaction increase the risk of automated or targeted attacks. Although no known exploits are currently in the wild, the high severity and ease of exploitation once admin access is obtained make this a critical concern for network security. Organizations with large deployments of OpenWRT devices, especially in critical infrastructure sectors, face increased risk of operational disruption and data breaches.

Mitigation Recommendations

To mitigate CVE-2024-51240, organizations should implement the following specific measures: 1) Restrict administrative access to OpenWRT devices by enforcing strong authentication mechanisms and limiting access to trusted networks or VPNs. 2) Disable or restrict access to the JSON-RPC API exposed by luci-mod-rpc unless absolutely necessary; consider firewall rules or access control lists to limit exposure. 3) Monitor and audit administrative activities and API usage logs to detect anomalous or unauthorized privilege escalation attempts. 4) Apply principle of least privilege by minimizing the number of users with admin rights on OpenWRT devices. 5) Segment network infrastructure to isolate critical devices and reduce the attack surface. 6) Stay informed about official patches or updates from OpenWRT and promptly apply them once available. 7) Consider deploying intrusion detection/prevention systems capable of recognizing suspicious RPC API calls. 8) Educate administrators on secure management practices and the risks of privilege escalation vulnerabilities. These targeted actions go beyond generic advice by focusing on controlling and monitoring access to the vulnerable API and limiting the potential for privilege escalation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bacb7ef31ef0b55895f

Added to database: 2/25/2026, 9:37:48 PM

Last enriched: 2/28/2026, 2:51:11 AM

Last updated: 4/12/2026, 5:07:49 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses