Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53563: n/a

0
Medium
VulnerabilityCVE-2024-53563cvecve-2024-53563
Published: Tue Jan 14 2025 (01/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-53563 is a stored cross-site scripting (XSS) vulnerability found in the Arcadyan Meteor 2 CPE FG360 Firmware ETV2. 10. This flaw allows attackers with limited privileges and requiring user interaction to inject malicious scripts or HTML payloads that execute in the context of the victim's browser. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires the attacker to have some level of authenticated access and the victim to interact with the malicious content. No known public exploits or patches are currently available. The vulnerability is rated medium severity with a CVSS score of 5. 4. Organizations using this firmware should monitor for updates and implement strict input validation and user access controls to mitigate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:46:52 UTC

Technical Analysis

CVE-2024-53563 is a stored cross-site scripting (XSS) vulnerability identified in the Arcadyan Meteor 2 CPE FG360 Firmware version ETV2.10. Stored XSS vulnerabilities occur when malicious input is permanently stored on the target system, such as in a database or configuration file, and later rendered in a web interface without proper sanitization. In this case, the vulnerability allows an attacker to inject crafted HTML or JavaScript payloads that execute in the context of the victim’s browser when they access the affected web interface. The CVSS 3.1 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity at a low level (C:L, I:L) but does not impact availability (A:N). This suggests that an attacker could steal sensitive information accessible via the web interface or manipulate displayed data but cannot disrupt device operation. No patches or public exploits have been reported yet. The vulnerability is categorized under CWE-79, a common weakness for XSS issues. Given the firmware is used in customer premises equipment (CPE), exploitation could lead to targeted attacks on users managing their devices via the web interface.

Potential Impact

The primary impact of CVE-2024-53563 is the potential compromise of user confidentiality and integrity through the execution of malicious scripts in the context of the device’s web management interface. Attackers could steal session cookies, credentials, or other sensitive data accessible via the interface, or manipulate displayed information to mislead users. While availability is not affected, the breach of confidentiality and integrity could facilitate further attacks such as privilege escalation or lateral movement within a network. Organizations deploying the Arcadyan Meteor 2 CPE FG360 firmware risk exposure of sensitive configuration data or user credentials, potentially undermining network security. The requirement for some privilege and user interaction limits the ease of exploitation but does not eliminate risk, especially in environments with multiple users or less stringent access controls. The absence of known exploits in the wild reduces immediate threat but underscores the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-53563, organizations should implement the following specific measures: 1) Restrict administrative and user access to the device’s web interface using strong authentication mechanisms and role-based access controls to minimize the number of users with privileges capable of injecting malicious input. 2) Employ network segmentation to isolate CPE devices from critical internal networks, reducing the impact of a compromised device. 3) Monitor and audit web interface inputs and logs for suspicious activity indicative of attempted XSS injection. 4) Apply strict input validation and output encoding on all user-supplied data fields within the device’s web interface, if possible via firmware updates or configuration changes. 5) Regularly check for firmware updates from Arcadyan and apply patches promptly once available. 6) Educate users about the risks of interacting with untrusted content or links that could trigger stored XSS payloads. 7) Consider deploying web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block XSS payloads targeting the device’s management interface. These steps go beyond generic advice by focusing on access control, monitoring, and network design tailored to the specific device and vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbfb7ef31ef0b55a9fc

Added to database: 2/25/2026, 9:38:07 PM

Last enriched: 2/26/2026, 1:46:52 AM

Last updated: 2/26/2026, 7:12:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats