Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42658 PoC — Nepstech NTPL-XPON1GFEVN 安全漏洞

Source
Associated Vulnerability
Title:Nepstech NTPL-XPON1GFEVN 安全漏洞 (CVE-2024-42658)
Description:An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookie's parameter
Description
 CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter
Readme
# CVE-2024-42658
 CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter

CVE-2024-42658:

Summary: A vulnerability in the wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows an unauthenticated, remote attacker to obtain sensitive information via the manipulation of cookies. The issue arises due to insufficient security measures for cookies, leading to potential leakage of sensitive information and unauthorized access.

Details: The wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 does not properly secure cookies, allowing sensitive information, such as session identifiers, to be accessed or manipulated by an attacker. This vulnerability can be exploited by an attacker who intercepts or forges cookies to gain unauthorized access to the router's management interface, potentially leading to further exploitation of the device.

Impact: Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to the router's management interface by leveraging insecure cookies, leading to potential control over the device and exposure of sensitive information.

Affected Versions: wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0

Remediation: Users are advised to upgrade to a firmware version that implements secure cookie handling practices, such as using the HttpOnly and Secure flags and ensuring that cookies are transmitted over HTTPS connections.
File Snapshot

[4.0K] /data/pocs/9c56e7b55a08d9d7412b279383dc83060a6ad731 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →