CVE-2024-54745: n/a
CVE-2024-54745 is a critical vulnerability affecting the WAVLINK WN701AE M01AE_V240305 device, where a hardcoded root password exists in the /etc/shadow file. This flaw allows remote attackers to log in as root without authentication, leading to full system compromise. The vulnerability has a CVSS score of 9. 8, indicating high severity with network attack vector, no privileges or user interaction required, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make this a significant threat. Organizations using this device should prioritize mitigation to prevent unauthorized root access. The vulnerability is classified under CWE-276 (Incorrect Default Permissions).
AI Analysis
Technical Summary
CVE-2024-54745 identifies a critical security flaw in the WAVLINK WN701AE M01AE_V240305 device firmware, where a hardcoded password is embedded in the /etc/shadow file. The /etc/shadow file stores hashed passwords for system accounts, and having a hardcoded password means attackers can bypass authentication mechanisms and gain root-level access remotely. This vulnerability is exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The CVSS 3.1 score of 9.8 reflects the vulnerability's critical nature, with complete compromise of confidentiality, integrity, and availability of the affected device. The CWE-276 classification indicates the root cause is improper default permissions or credentials. No patches or fixes have been linked yet, and no active exploits have been reported, but the presence of a hardcoded root password is a severe security oversight that can lead to full device takeover, data theft, or use of the device as a pivot point for further network attacks.
Potential Impact
The impact of this vulnerability is severe for organizations using the affected WAVLINK device. Attackers gaining root access can fully control the device, alter configurations, intercept or manipulate network traffic, deploy malware, or use the device as a foothold to attack internal networks. This can lead to data breaches, service disruptions, and compromise of other connected systems. Since the device is likely used in enterprise or home network environments, the scope of impact can range from individual users to large organizations. The vulnerability undermines trust in the device's security and can cause reputational damage to organizations relying on WAVLINK hardware. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts once the vulnerability details become public.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected WAVLINK WN701AE devices from critical networks to limit exposure. Network administrators should disable remote management interfaces if possible and monitor network traffic for suspicious login attempts. Since no official patches are currently available, organizations should contact WAVLINK support for guidance or firmware updates. As a temporary workaround, replacing the device with a more secure alternative or implementing network-level access controls such as firewall rules and VPNs to restrict access to the device is recommended. Additionally, auditing all devices for similar hardcoded credentials and enforcing strict password policies can reduce risk. Organizations should also prepare incident response plans to quickly address potential compromises involving this vulnerability.
Affected Countries
United States, China, Germany, United Kingdom, France, Japan, South Korea, India, Canada, Australia
CVE-2024-54745: n/a
Description
CVE-2024-54745 is a critical vulnerability affecting the WAVLINK WN701AE M01AE_V240305 device, where a hardcoded root password exists in the /etc/shadow file. This flaw allows remote attackers to log in as root without authentication, leading to full system compromise. The vulnerability has a CVSS score of 9. 8, indicating high severity with network attack vector, no privileges or user interaction required, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make this a significant threat. Organizations using this device should prioritize mitigation to prevent unauthorized root access. The vulnerability is classified under CWE-276 (Incorrect Default Permissions).
AI-Powered Analysis
Technical Analysis
CVE-2024-54745 identifies a critical security flaw in the WAVLINK WN701AE M01AE_V240305 device firmware, where a hardcoded password is embedded in the /etc/shadow file. The /etc/shadow file stores hashed passwords for system accounts, and having a hardcoded password means attackers can bypass authentication mechanisms and gain root-level access remotely. This vulnerability is exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The CVSS 3.1 score of 9.8 reflects the vulnerability's critical nature, with complete compromise of confidentiality, integrity, and availability of the affected device. The CWE-276 classification indicates the root cause is improper default permissions or credentials. No patches or fixes have been linked yet, and no active exploits have been reported, but the presence of a hardcoded root password is a severe security oversight that can lead to full device takeover, data theft, or use of the device as a pivot point for further network attacks.
Potential Impact
The impact of this vulnerability is severe for organizations using the affected WAVLINK device. Attackers gaining root access can fully control the device, alter configurations, intercept or manipulate network traffic, deploy malware, or use the device as a foothold to attack internal networks. This can lead to data breaches, service disruptions, and compromise of other connected systems. Since the device is likely used in enterprise or home network environments, the scope of impact can range from individual users to large organizations. The vulnerability undermines trust in the device's security and can cause reputational damage to organizations relying on WAVLINK hardware. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts once the vulnerability details become public.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected WAVLINK WN701AE devices from critical networks to limit exposure. Network administrators should disable remote management interfaces if possible and monitor network traffic for suspicious login attempts. Since no official patches are currently available, organizations should contact WAVLINK support for guidance or firmware updates. As a temporary workaround, replacing the device with a more secure alternative or implementing network-level access controls such as firewall rules and VPNs to restrict access to the device is recommended. Additionally, auditing all devices for similar hardcoded credentials and enforcing strict password policies can reduce risk. Organizations should also prepare incident response plans to quickly address potential compromises involving this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bc6b7ef31ef0b55ad57
Added to database: 2/25/2026, 9:38:14 PM
Last enriched: 2/26/2026, 1:53:24 AM
Last updated: 2/26/2026, 8:03:39 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.