CVE-2024-48457

7.5 HIGH

📋 TL;DR

This vulnerability in multiple Netis router models allows remote attackers to access sensitive information through specific endpoints and binaries. Affected users include anyone using the listed Netis router models with vulnerable firmware versions.

💻 Affected Systems

Products:
  • Netis Wifi6 Router NX10
  • Netis Wifi 11AC Router NC65
  • Netis Wifi 11AC Router NC63
  • Netis Wifi 11AC Router NC21
  • Netis Wifi Router MW5360
Versions: NX10: 2.0.1.3643, 2.0.1.3582; NC65: 3.0.0.3749; NC63: 3.0.0.3327, 3.0.0.3503; NC21: 3.0.0.3800, 3.0.0.3500, 3.0.0.3329; MW5360: 1.0.1.3442, 1.0.1.3031
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All listed firmware versions are vulnerable in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain router credentials, configuration data, or other sensitive information leading to complete network compromise.

🟠

Likely Case

Information disclosure exposing router settings, network configurations, or authentication details.

🟢

If Mitigated

Limited impact if routers are behind firewalls with restricted WAN access and proper network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the router's web interface endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Netis official website for updated firmware

Vendor Advisory: Not provided in CVE details

Restart Required: Yes

Instructions:

1. Visit Netis official website 2. Download latest firmware for your router model 3. Access router admin interface 4. Upload and apply firmware update 5. Reboot router

🔧 Temporary Workarounds

Restrict Access

all

Block external access to router admin interface

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules
  • Disable remote administration and WAN access to admin interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface and compare with affected versions list

Check Version:

Login to router admin interface and check System Status or Firmware page

Verify Fix Applied:

Confirm firmware version has been updated to non-vulnerable version

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to /cgi-bin/skk_set.cgi endpoint
  • Multiple failed access attempts to admin interface

Network Indicators:

  • External IP addresses accessing router admin ports
  • Unusual traffic patterns to router management interface

SIEM Query:

source_ip=external AND dest_port IN (80,443) AND url_path CONTAINS '/cgi-bin/skk_set.cgi'

🔗 References

📤 Share & Export