CVE-2024-53561

8.7 HIGH

📋 TL;DR

A remote code execution vulnerability in Arcadyan Meteor 2 CPE FG360 firmware allows attackers to execute arbitrary code on affected devices via specially crafted requests. This affects organizations using Arcadyan Meteor 2 CPE FG360 devices with vulnerable firmware versions. The vulnerability could lead to complete device compromise and network infiltration.

💻 Affected Systems

Products:
  • Arcadyan Meteor 2 CPE FG360
Versions: ETV2.10 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of the device, pivot to internal networks, deploy ransomware, exfiltrate sensitive data, and establish persistent backdoors.

🟠

Likely Case

Attackers compromise the device to intercept network traffic, modify configurations, or use it as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated device with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting specific requests but no authentication bypass is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ETV2.11 or later

Vendor Advisory: https://www.arcadyan.com/en-us/solutions/idea/fiveG/

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Arcadyan support portal. 3. Upload firmware via device web interface. 4. Apply update and restart device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules.

Access Control Lists

all

Implement ACLs to restrict management interface access to trusted IPs only.

🧯 If You Can't Patch

  • Deploy network-based intrusion prevention systems to block exploit attempts
  • Monitor device logs for unusual request patterns and unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface under System > Firmware Information

Check Version:

Check via web interface or SSH if enabled: show version

Verify Fix Applied:

Confirm firmware version is ETV2.11 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to management interface
  • Unexpected process execution
  • Configuration changes without authorization

Network Indicators:

  • Suspicious traffic patterns to device management ports
  • Outbound connections from device to unknown destinations

SIEM Query:

source="arcadyan-device" AND (event_type="http_request" AND uri CONTAINS "exploit_pattern" OR process="unexpected_executable")

🔗 References

📤 Share & Export