Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-25852

EPSS 93.05% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-25852

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Linksys RE7000 v2.0.9, v2.0.11, and v2.0.15 have a command execution vulnerability in the "AccessControlList" parameter of the access control function point. An attacker can use the vulnerability to obtain device administrator rights.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linksys RE7000 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linksys RE7000是美国Linksys公司的一款无线信号扩展器。 Linksys RE7000存在安全漏洞,该漏洞源于AccessControlList参数存在命令执行漏洞。攻击者可以利用该漏洞获取设备管理员权限。受影响的产品和版本:Linksys RE7000 v2.0.9版本, v2.0.11版本,v2.0.15版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-25852

#POC DescriptionSource LinkShenlong Link
1Linksys RE7000 v2.0.9, v2.0.11, and v2.0.15 have a command execution vulnerability in the "AccessControlList" parameter of the access control function point https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-25852.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-25852

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-04-11 · 23 CVEs total

CVE-2024-215089.8 CRITICALmysql2 安全漏洞
CVE-2024-31678Loan Management System 安全漏洞
CVE-2023-48865Reportico 安全漏洞
CVE-2024-28458swfdump 安全漏洞
CVE-2024-27592website 安全漏洞
CVE-2024-25376Thesycon Software Solutions TUSBAudio 安全漏洞
CVE-2024-22722Form Tools 安全漏洞
CVE-2024-22721Form Tools 跨站请求伪造漏洞
CVE-2024-22719Form Tools SQL注入漏洞
CVE-2024-22718Form Tools 安全漏洞
CVE-2024-22717Form Tools 安全漏洞
CVE-2024-30878RageFrame2 安全漏洞
CVE-2023-29483Eventlet 安全漏洞
CVE-2024-29399GNU Savane 安全漏洞
CVE-2024-30917eProsima Fast DDS 安全漏洞
CVE-2024-30916eProsima Fast DDS 安全漏洞
CVE-2024-30915Object Computing OpenDDS 安全漏洞
CVE-2024-30885HadSky 安全漏洞
CVE-2024-30884Discuz! 安全漏洞
CVE-2024-30883RageFrame2 安全漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-25852

No comments yet


Leave a comment