Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52023: n/a

0
Medium
VulnerabilityCVE-2024-52023cvecve-2024-52023
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at pppoe2.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:00:45 UTC

Technical Analysis

CVE-2024-52023 is a stack-based buffer overflow vulnerability identified in specific firmware versions of Netgear routers: XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128. The flaw exists in the handling of the pppoe_localip parameter within the pppoe2.cgi CGI endpoint. By sending a specially crafted POST request containing malicious input to this parameter, an attacker with low privileges can trigger a stack overflow condition. This overflow can cause the router to crash or reboot, resulting in a Denial of Service (DoS) that disrupts network availability. The vulnerability does not allow for code execution or data leakage but impacts service continuity. The CVSS v3.1 score of 5.7 reflects a medium severity rating, with an attack vector requiring adjacent network access, low attack complexity, and no user interaction. No public exploits or patches are currently available, and the vulnerability is classified under CWE-120 (Classic Buffer Overflow).

Potential Impact

The primary impact of CVE-2024-52023 is on the availability of affected Netgear routers. Successful exploitation results in a Denial of Service, causing network outages or interruptions for users relying on these devices. This can affect both home users and small to medium-sized enterprises that deploy these models. Disruptions could lead to loss of productivity, inability to access network resources, and potential cascading effects if these routers serve as critical network gateways. Since the vulnerability does not compromise confidentiality or integrity, data theft or manipulation is not a direct concern. However, repeated or targeted DoS attacks could be leveraged as part of larger multi-vector attacks or to facilitate lateral movement by distracting defenders.

Mitigation Recommendations

Organizations should immediately identify if they use the affected Netgear models and firmware versions. Since no official patches are currently available, temporary mitigations include restricting access to the router management interfaces, especially blocking POST requests to the pppoe2.cgi endpoint from untrusted or external networks. Network segmentation should isolate these devices from general user networks to limit exposure. Monitoring network traffic for unusual POST requests targeting pppoe2.cgi can help detect exploitation attempts. Administrators should subscribe to Netgear security advisories for timely patch releases and apply firmware updates as soon as they become available. Additionally, consider deploying network-based DoS protection mechanisms and maintaining regular backups of router configurations to facilitate rapid recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb6b7ef31ef0b55a49e

Added to database: 2/25/2026, 9:37:58 PM

Last enriched: 2/28/2026, 3:00:45 AM

Last updated: 4/12/2026, 6:16:55 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses