Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-54772

EPSS 2.04% · P84
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-54772

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the Winbox service of MikroTik RouterOS long-term release v6.43.13 through v6.49.13 and stable v6.43 through v7.17.2. A patch is available in the stable release v6.49.18. A discrepancy in response size between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MikroTik RouterOS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MikroTik RouterOS是拉脱维亚MikroTik公司的一套基于Linux开发的路由器操作系统。该系统可部署在PC中,使其提供路由器功能。 MikroTik RouterOS v6.43版本至v7.16.1版本存在安全漏洞,该漏洞源于使用有效用户名和无效用户名进行的连接尝试之间的响应时间存在差异,可能导致攻击者可以枚举有效帐户。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-54772

#POC DescriptionSource LinkShenlong Link
1This repo contains the exploit for CVE-2024-54772 which can enumerate valid usernames in Mikrotik routers running RouterOShttps://github.com/deauther890/CVE-2024-54772POC Details
2Nonehttps://github.com/Seven11Eleven/CVE-2024-54772POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-54772

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-02-11 · 20 CVEs total

CVE-2025-12116.5 MEDIUMHackney 安全漏洞
CVE-2025-25528WAVLINK WL-WN575A3 安全漏洞
CVE-2024-33469Amaze File Manager 安全漏洞
CVE-2024-54916Telegram 安全漏洞
CVE-2024-44336AnkiDroid 安全漏洞
CVE-2022-37660hostapd 安全漏洞
CVE-2024-51324Baidu Antivirus 安全漏洞
CVE-2024-55212DNNGo xBlog 安全漏洞
CVE-2024-57241DesDev DedeCMS 安全漏洞
CVE-2024-57777lanproxy 安全漏洞
CVE-2025-25522Linksys WAP610N 安全漏洞
CVE-2025-25530Digital China Networks DCBI-Netlog-LAB 安全漏洞
CVE-2025-25527Ruijie Networks RG-NBR2600S 安全漏洞
CVE-2025-25529Digital China Networks DCBC Gateway 安全漏洞
CVE-2025-25525H3C FA3010L 安全漏洞
CVE-2025-25526Mercury MIPC552W 安全漏洞
CVE-2025-25524TOTOLINK X6000R 安全漏洞
CVE-2025-25523TRENDnet TEG-40128 安全漏洞
CVE-2022-35202Sitevision 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-54772

No comments yet


Leave a comment