Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2024-45413
HistorySep 16, 2024 - 12:00 a.m.

CVE-2024-45413

2024-09-1600:00:00
mitre
github.com
1
zte routers
httpd
buffer overflow
rsa_decrypt
lua
rce
authenticated attacker

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_z500_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_z500_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.0.1.1B2.1000"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_e500_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_e500_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.0.1.1B2.1000"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_h108n_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V2.6.20.ROST12"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_e2615_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_e2615_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.0.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_e2603_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_e2603_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.0.1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_e2618_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_e2618_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.0.0.2B4.3000"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_e1600_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_e1600_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.0.0.2B1.1000"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_h338a_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_h338a_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V1.5.0_H3A.1T9P1-o"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_h168n_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_h168n_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "V3.5.5_CO.1T1"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zte:zxhn_h168a_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zte",
    "product": "zxhn_h168a_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "TTN.1T1_211029"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-45413