CVE-2024-54763: n/a
An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
AI Analysis
Technical Summary
CVE-2024-54763 is an access control vulnerability identified in the ipTIME A2004 router firmware version 12.17.0, specifically within the /login/hostinfo.cgi component. This vulnerability allows attackers to bypass authentication mechanisms and access sensitive information stored or processed by the device. The flaw arises because the affected CGI endpoint does not properly enforce access restrictions, enabling unauthenticated remote attackers to retrieve potentially sensitive host information. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity with a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, as attackers can obtain information that may facilitate further attacks or reconnaissance but does not directly affect availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability affects the ipTIME A2004 router, a device commonly used in home and small office networks, particularly in regions where ipTIME products have strong market presence. The lack of authentication requirement and ease of exploitation make this vulnerability a notable risk for unauthorized information disclosure.
Potential Impact
The primary impact of CVE-2024-54763 is unauthorized disclosure of sensitive information from affected ipTIME A2004 routers. Attackers can remotely access the /login/hostinfo.cgi endpoint without authentication, potentially gaining details about the device's configuration, network environment, or other sensitive host data. This information disclosure can facilitate further targeted attacks, such as credential theft, network mapping, or exploitation of other vulnerabilities. While the vulnerability does not directly enable device takeover or denial of service, the compromised confidentiality and integrity of information can undermine network security. Organizations relying on ipTIME A2004 routers, especially in environments with sensitive data or critical infrastructure, face increased risk of reconnaissance and subsequent attacks. The medium severity rating reflects the balance between ease of exploitation and limited direct impact on availability or full system compromise. However, the widespread deployment of the affected device in certain regions could amplify the overall risk landscape.
Mitigation Recommendations
To mitigate CVE-2024-54763, organizations should first verify if their ipTIME A2004 routers are running firmware version 12.17.0 or earlier and seek firmware updates from the vendor as soon as they become available. In the absence of an official patch, network administrators should restrict access to the router's management interfaces by implementing network segmentation and firewall rules that block external access to the /login/hostinfo.cgi endpoint. Disabling remote management features or limiting them to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual requests to the vulnerable CGI endpoint can help detect exploitation attempts. Additionally, changing default credentials and enforcing strong authentication policies on router management interfaces can limit the impact of information disclosure. Regularly auditing router configurations and applying security best practices for IoT and network devices will further reduce risk.
Affected Countries
South Korea, China, Japan, United States, Germany, France, United Kingdom, Russia, India, Brazil
CVE-2024-54763: n/a
Description
An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-54763 is an access control vulnerability identified in the ipTIME A2004 router firmware version 12.17.0, specifically within the /login/hostinfo.cgi component. This vulnerability allows attackers to bypass authentication mechanisms and access sensitive information stored or processed by the device. The flaw arises because the affected CGI endpoint does not properly enforce access restrictions, enabling unauthenticated remote attackers to retrieve potentially sensitive host information. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity with a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, as attackers can obtain information that may facilitate further attacks or reconnaissance but does not directly affect availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability affects the ipTIME A2004 router, a device commonly used in home and small office networks, particularly in regions where ipTIME products have strong market presence. The lack of authentication requirement and ease of exploitation make this vulnerability a notable risk for unauthorized information disclosure.
Potential Impact
The primary impact of CVE-2024-54763 is unauthorized disclosure of sensitive information from affected ipTIME A2004 routers. Attackers can remotely access the /login/hostinfo.cgi endpoint without authentication, potentially gaining details about the device's configuration, network environment, or other sensitive host data. This information disclosure can facilitate further targeted attacks, such as credential theft, network mapping, or exploitation of other vulnerabilities. While the vulnerability does not directly enable device takeover or denial of service, the compromised confidentiality and integrity of information can undermine network security. Organizations relying on ipTIME A2004 routers, especially in environments with sensitive data or critical infrastructure, face increased risk of reconnaissance and subsequent attacks. The medium severity rating reflects the balance between ease of exploitation and limited direct impact on availability or full system compromise. However, the widespread deployment of the affected device in certain regions could amplify the overall risk landscape.
Mitigation Recommendations
To mitigate CVE-2024-54763, organizations should first verify if their ipTIME A2004 routers are running firmware version 12.17.0 or earlier and seek firmware updates from the vendor as soon as they become available. In the absence of an official patch, network administrators should restrict access to the router's management interfaces by implementing network segmentation and firewall rules that block external access to the /login/hostinfo.cgi endpoint. Disabling remote management features or limiting them to trusted IP addresses can reduce exposure. Monitoring network traffic for unusual requests to the vulnerable CGI endpoint can help detect exploitation attempts. Additionally, changing default credentials and enforcing strong authentication policies on router management interfaces can limit the impact of information disclosure. Regularly auditing router configurations and applying security best practices for IoT and network devices will further reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bc6b7ef31ef0b55adbc
Added to database: 2/25/2026, 9:38:14 PM
Last enriched: 2/28/2026, 3:23:41 AM
Last updated: 4/11/2026, 7:54:34 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.