Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54745: n/a

0
Critical
VulnerabilityCVE-2024-54745cvecve-2024-54745
Published: Fri Dec 06 2024 (12/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-54745 is a critical vulnerability affecting the WAVLINK WN701AE M01AE_V240305 device, where a hardcoded root password exists in the /etc/shadow file. This flaw allows remote attackers to log in as root without authentication, leading to full system compromise. The vulnerability has a CVSS score of 9. 8, indicating high severity with network attack vector, no privileges or user interaction required, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make this a significant threat. Organizations using this device should prioritize mitigation to prevent unauthorized root access. The vulnerability is classified under CWE-276 (Incorrect Default Permissions).

AI-Powered Analysis

AILast updated: 02/26/2026, 01:53:24 UTC

Technical Analysis

CVE-2024-54745 identifies a critical security flaw in the WAVLINK WN701AE M01AE_V240305 device firmware, where a hardcoded password is embedded in the /etc/shadow file. The /etc/shadow file stores hashed passwords for system accounts, and having a hardcoded password means attackers can bypass authentication mechanisms and gain root-level access remotely. This vulnerability is exploitable over the network without any privileges or user interaction, making it highly accessible to attackers. The CVSS 3.1 score of 9.8 reflects the vulnerability's critical nature, with complete compromise of confidentiality, integrity, and availability of the affected device. The CWE-276 classification indicates the root cause is improper default permissions or credentials. No patches or fixes have been linked yet, and no active exploits have been reported, but the presence of a hardcoded root password is a severe security oversight that can lead to full device takeover, data theft, or use of the device as a pivot point for further network attacks.

Potential Impact

The impact of this vulnerability is severe for organizations using the affected WAVLINK device. Attackers gaining root access can fully control the device, alter configurations, intercept or manipulate network traffic, deploy malware, or use the device as a foothold to attack internal networks. This can lead to data breaches, service disruptions, and compromise of other connected systems. Since the device is likely used in enterprise or home network environments, the scope of impact can range from individual users to large organizations. The vulnerability undermines trust in the device's security and can cause reputational damage to organizations relying on WAVLINK hardware. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts once the vulnerability details become public.

Mitigation Recommendations

Immediate mitigation steps include isolating the affected WAVLINK WN701AE devices from critical networks to limit exposure. Network administrators should disable remote management interfaces if possible and monitor network traffic for suspicious login attempts. Since no official patches are currently available, organizations should contact WAVLINK support for guidance or firmware updates. As a temporary workaround, replacing the device with a more secure alternative or implementing network-level access controls such as firewall rules and VPNs to restrict access to the device is recommended. Additionally, auditing all devices for similar hardcoded credentials and enforcing strict password policies can reduce risk. Organizations should also prepare incident response plans to quickly address potential compromises involving this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc6b7ef31ef0b55ad57

Added to database: 2/25/2026, 9:38:14 PM

Last enriched: 2/26/2026, 1:53:24 AM

Last updated: 2/26/2026, 8:03:39 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats