Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58277: CWE-312 Cleartext Storage of Sensitive Information in R Radio Network Radio Network FM Transmitter

0
High
VulnerabilityCVE-2024-58277cvecve-2024-58277cwe-312
Published: Thu Dec 04 2025 (12/04/2025, 20:42:19 UTC)
Source: CVE Database V5
Vendor/Project: R Radio Network
Product: Radio Network FM Transmitter

Description

R Radio Network FM Transmitter 1.07 allows unauthenticated attackers to access the admin user's password through the system.cgi endpoint, enabling authentication bypass and FM station setup access.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:11:32 UTC

Technical Analysis

CVE-2024-58277 identifies a critical vulnerability in the R Radio Network FM Transmitter version 1.07, where sensitive information, specifically the admin user's password, is stored in cleartext and accessible through the system.cgi endpoint. This flaw corresponds to CWE-312, indicating improper protection of sensitive data at rest. An unauthenticated attacker can remotely access this endpoint without any privileges or user interaction, retrieve the admin password, and bypass authentication mechanisms. This unauthorized access allows the attacker to manipulate FM station setup parameters, potentially disrupting broadcast operations or injecting malicious configurations. The vulnerability is network-exploitable, does not require authentication, and affects the confidentiality and integrity of the device's administrative controls. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable. The CVSS 4.0 base score of 8.7 reflects its critical impact, with network attack vector, low complexity, no privileges or user interaction required, and high confidentiality impact. The lack of available patches or firmware updates at the time of publication increases the urgency for affected organizations to implement compensating controls. This vulnerability highlights the risks of insecure credential storage in embedded broadcasting devices, emphasizing the need for secure development practices and timely vulnerability management.

Potential Impact

For European organizations, particularly those involved in broadcasting, media, and telecommunications, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control over FM transmission settings, resulting in potential broadcast disruption, misinformation dissemination, or service outages. The compromise of administrative credentials undermines device integrity and confidentiality, potentially allowing attackers to persistently manipulate broadcast content or disrupt operations. Given the critical role of radio networks in emergency communications and public information dissemination, exploitation could have broader societal impacts. Additionally, organizations may face regulatory and reputational damage if such vulnerabilities lead to service interruptions or data breaches. The vulnerability's remote and unauthenticated nature increases the attack surface, especially if devices are exposed to public or poorly segmented networks. European broadcasters relying on R Radio Network FM Transmitter 1.07 must consider the operational and compliance risks associated with this vulnerability.

Mitigation Recommendations

1. Immediate isolation of affected FM Transmitter devices from public or untrusted networks to limit exposure. 2. Implement strict network segmentation and firewall rules to restrict access to the system.cgi endpoint only to trusted administrative hosts. 3. Monitor network traffic for unusual access attempts to the management interface and system.cgi endpoint. 4. Engage with R Radio Network vendor support to obtain firmware updates or patches addressing the vulnerability; if unavailable, request guidance on secure configuration. 5. Change all default and potentially compromised administrative passwords once a patch or fix is applied. 6. Employ multi-factor authentication (MFA) on management interfaces where possible to add an additional security layer. 7. Conduct regular security audits and vulnerability assessments on broadcasting infrastructure to detect similar issues. 8. Develop incident response plans specific to broadcast infrastructure compromise scenarios. 9. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Educate operational staff about the risks and signs of exploitation to enable rapid detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-04T16:29:09.649Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931f4df0459f550ecf89e3a

Added to database: 12/4/2025, 8:53:51 PM

Last enriched: 12/11/2025, 10:11:32 PM

Last updated: 1/18/2026, 12:38:16 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats