Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57224: n/a

0
Critical
VulnerabilityCVE-2024-57224cvecve-2024-57224
Published: Fri Jan 10 2025 (01/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-57224 is a critical command injection vulnerability affecting the Linksys E7350 router firmware version 1. 1. 00. 032. The flaw exists in the apcli_do_enr_pin_wps function via the ifname parameter, allowing unauthenticated remote attackers to execute arbitrary commands. With a CVSS score of 9. 8, this vulnerability impacts confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently reported in the wild, exploitation could lead to full device compromise. Organizations using this router model are at high risk, especially in environments where these devices are deployed at scale. Mitigation requires immediate firmware updates once available and network segmentation to limit exposure.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:15:21 UTC

Technical Analysis

CVE-2024-57224 is a command injection vulnerability identified in the Linksys E7350 router firmware version 1.1.00.032. The vulnerability resides in the apcli_do_enr_pin_wps function, specifically through improper sanitization of the 'ifname' parameter. This flaw allows an unauthenticated remote attacker to inject and execute arbitrary system commands on the affected device. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that user-supplied input is not properly validated before being passed to a system command. The CVSS v3.1 base score is 9.8, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This means an attacker can fully compromise the device remotely without any authentication or user action. The vulnerability could allow attackers to take control of the router, intercept or manipulate network traffic, disrupt network services, or use the device as a foothold for further attacks within the network. Currently, no patches or firmware updates are listed, and no exploits have been reported in the wild, but the high severity score indicates a significant risk once exploitation techniques become publicly available.

Potential Impact

The impact of CVE-2024-57224 is severe for organizations using the Linksys E7350 router. Successful exploitation can lead to complete device compromise, allowing attackers to execute arbitrary commands with root privileges. This can result in unauthorized access to internal networks, interception or modification of sensitive data, disruption of network availability, and potential pivoting to other internal systems. The vulnerability threatens confidentiality, integrity, and availability simultaneously, making it a critical risk for enterprise, government, and home networks. Organizations relying on these routers for secure wireless connectivity or as part of their network infrastructure may face significant operational disruptions and data breaches. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once public exploits emerge. Additionally, compromised routers can be leveraged in botnets or for launching further attacks, amplifying the threat landscape.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to reduce exposure. Administrators should isolate affected Linksys E7350 devices from untrusted networks and restrict remote management interfaces to trusted IP addresses only. Implement strict firewall rules to block unauthorized access to router management ports. Monitor network traffic for unusual activity indicative of exploitation attempts. Since no official patch is currently available, consider temporarily replacing or disabling vulnerable devices in critical environments. Once Linksys releases a firmware update addressing this vulnerability, prioritize prompt installation. Additionally, conduct regular security audits of network devices to identify and remediate similar vulnerabilities. Employ network segmentation to limit lateral movement if a device is compromised. Educate staff about the risks of unpatched network hardware and maintain an inventory of all deployed devices to ensure timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd6b7ef31ef0b55b53b

Added to database: 2/25/2026, 9:38:30 PM

Last enriched: 2/26/2026, 2:15:21 AM

Last updated: 2/26/2026, 7:27:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats