Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5505: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NETGEAR ProSAFE Network Management System

0
High
VulnerabilityCVE-2024-5505cvecve-2024-5505cwe-22
Published: Thu Jun 06 2024 (06/06/2024, 17:49:15 UTC)
Source: CVE Database V5
Vendor/Project: NETGEAR
Product: ProSAFE Network Management System

Description

CVE-2024-5505 is a high-severity path traversal vulnerability in the NETGEAR ProSAFE Network Management System version 1. 7. 0. 34 x64. It exists in the UpLoadServlet component, where insufficient validation of user-supplied paths allows authenticated attackers to perform directory traversal. Exploiting this flaw enables remote code execution with SYSTEM-level privileges, compromising confidentiality, integrity, and availability. No user interaction is required beyond authentication. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations using this product. Immediate patching or mitigation is recommended to prevent potential exploitation. Countries with large NETGEAR deployments and critical infrastructure using this system are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:38:21 UTC

Technical Analysis

CVE-2024-5505 is a critical path traversal vulnerability identified in the NETGEAR ProSAFE Network Management System, specifically affecting version 1.7.0.34 x64. The vulnerability resides in the UpLoadServlet class, which fails to properly validate user-supplied file paths before performing file operations. This improper limitation of pathname (CWE-22) allows an authenticated attacker to craft malicious requests that traverse directories outside the intended restricted directory. By exploiting this flaw, attackers can upload or manipulate files arbitrarily, leading to remote code execution (RCE) in the context of the SYSTEM user on the affected host. The vulnerability requires authentication but no additional user interaction, and the attack vector is network accessible (AV:N). The CVSS v3.0 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. This vulnerability was reserved on May 29, 2024, and published on June 6, 2024, with no known exploits in the wild at the time of reporting. The flaw was tracked by the Zero Day Initiative as ZDI-CAN-22724. The lack of proper input sanitization in the servlet's file handling logic is the root cause, enabling directory traversal and subsequent arbitrary code execution. This vulnerability can lead to full system compromise, data breaches, and disruption of network management operations.

Potential Impact

The impact of CVE-2024-5505 is severe for organizations deploying the affected NETGEAR ProSAFE Network Management System. Successful exploitation grants attackers SYSTEM-level remote code execution capabilities, allowing complete control over the affected device. This can lead to unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and potential lateral movement within the enterprise network. The compromise of network management infrastructure can disrupt monitoring and management capabilities, degrade network availability, and facilitate further attacks on connected systems. Confidentiality breaches may expose sensitive organizational data, while integrity violations can alter critical network settings, causing operational failures. The requirement for authentication limits exploitation to insiders or attackers who have obtained valid credentials, but the low complexity and high privileges gained make this a critical risk. Organizations relying on this system for network management should consider this vulnerability a significant threat to their cybersecurity posture.

Mitigation Recommendations

To mitigate CVE-2024-5505, organizations should immediately upgrade to a patched version of the NETGEAR ProSAFE Network Management System once available. In the absence of an official patch, administrators should restrict access to the management interface to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. Enforce strong authentication mechanisms and monitor for unusual login activity to detect potential credential compromise. Implement strict input validation and sanitization at the application level if custom modifications are possible. Regularly audit and review file system permissions on the management system to prevent unauthorized file modifications. Employ intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious directory traversal attempts. Finally, maintain comprehensive logging and monitoring to quickly detect exploitation attempts and respond accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-05-29T21:30:18.144Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6be9b7ef31ef0b55c11b

Added to database: 2/25/2026, 9:38:49 PM

Last enriched: 2/26/2026, 2:38:21 AM

Last updated: 2/26/2026, 4:57:22 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats