Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55513: n/a

0
Critical
VulnerabilityCVE-2024-55513cvecve-2024-55513
Published: Tue Dec 17 2024 (12/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-55513 is a critical vulnerability affecting Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 devices running firmware version 3. 90. The flaw exists in the /upload_netaction. php component of the web interface, allowing attackers to upload arbitrary files by crafting a malicious form name. This can lead to unauthorized access and potentially full compromise of server permissions without requiring authentication or user interaction. The vulnerability is classified under CWE-22 (Path Traversal) and has a CVSS score of 9. 1, indicating high impact on confidentiality and integrity. No known exploits are currently reported in the wild, and no patches have been published yet. Organizations using these Raisecom devices should prioritize mitigation to prevent exploitation. The most affected countries are those with significant deployments of Raisecom network equipment, including China, India, Russia, Brazil, and several Southeast Asian nations.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:07:37 UTC

Technical Analysis

CVE-2024-55513 is a critical security vulnerability identified in multiple Raisecom network devices—MSG1200, MSG2100E, MSG2200, and MSG2300—specifically in firmware version 3.90. The vulnerability resides in the /upload_netaction.php endpoint of the device's web interface, which improperly validates the form name parameter used during file uploads. By crafting a specially designed form name, an attacker can bypass normal upload restrictions and upload arbitrary files to the device. This arbitrary file upload can lead to unauthorized access to server permissions, potentially allowing the attacker to execute malicious code, alter device configurations, or gain persistent access. The vulnerability is categorized under CWE-22, indicating a path traversal or directory traversal weakness that enables attackers to write files outside intended directories. The CVSS v3.1 base score is 9.1, reflecting a network attack vector with low complexity, no privileges required, no user interaction, and high impact on confidentiality and integrity. Although no public exploits have been reported yet, the critical nature of this flaw and the widespread use of Raisecom devices in telecommunications and enterprise networks make it a significant threat. No official patches or updates have been released at the time of publication, increasing the urgency for interim mitigations.

Potential Impact

The exploitation of CVE-2024-55513 can have severe consequences for organizations using affected Raisecom devices. Successful arbitrary file uploads can lead to unauthorized access to sensitive device files and configurations, potentially allowing attackers to execute arbitrary commands or deploy persistent malware. This compromises the confidentiality and integrity of network infrastructure, potentially disrupting network operations or enabling further lateral movement within the network. Telecommunications providers and enterprises relying on these devices for critical network functions could face service interruptions, data breaches, and regulatory compliance violations. Given the network-accessible nature of the vulnerability and lack of authentication requirements, attackers can exploit this remotely with relative ease. The absence of known exploits currently provides a limited window for defense, but the critical CVSS score underscores the urgency for organizations to act swiftly. The impact extends beyond individual devices, as compromised network equipment can serve as a foothold for broader attacks against enterprise or service provider networks.

Mitigation Recommendations

To mitigate CVE-2024-55513, organizations should immediately restrict access to the web management interface of affected Raisecom devices by implementing network segmentation and firewall rules that limit access to trusted administrators only. Employ VPNs or secure management channels to reduce exposure to the internet or untrusted networks. Monitor device logs and network traffic for unusual file upload attempts or anomalous activity related to /upload_netaction.php. Disable or restrict the file upload functionality if feasible until a vendor patch is available. Regularly check Raisecom’s official channels for security advisories and promptly apply any released firmware updates or patches addressing this vulnerability. Additionally, implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting suspicious upload patterns. Conduct thorough audits of device configurations and access controls to ensure no unauthorized changes have occurred. Prepare incident response plans specific to network device compromise scenarios to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd0b7ef31ef0b55b21b

Added to database: 2/25/2026, 9:38:24 PM

Last enriched: 2/26/2026, 2:07:37 AM

Last updated: 2/26/2026, 7:17:37 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats