Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42658 PoC — Nepstech NTPL-XPON1GFEVN 安全漏洞

Source
Associated Vulnerability
Title:Nepstech NTPL-XPON1GFEVN 安全漏洞 (CVE-2024-42658)
Description:Nepstech NTPL-XPON1GFEVN是Nepstech公司的一款无线路由器。 Nepstech NTPL-XPON1GFEVN v1.0版本存在安全漏洞。攻击者利用该漏洞可以通过cookie的参数获取敏感信息。
Description
 CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter
Readme
# CVE-2024-42658
 CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter

CVE-2024-42658:

Summary: A vulnerability in the wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows an unauthenticated, remote attacker to obtain sensitive information via the manipulation of cookies. The issue arises due to insufficient security measures for cookies, leading to potential leakage of sensitive information and unauthorized access.

Details: The wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 does not properly secure cookies, allowing sensitive information, such as session identifiers, to be accessed or manipulated by an attacker. This vulnerability can be exploited by an attacker who intercepts or forges cookies to gain unauthorized access to the router's management interface, potentially leading to further exploitation of the device.

Impact: Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to the router's management interface by leveraging insecure cookies, leading to potential control over the device and exposure of sensitive information.

Affected Versions: wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0

Remediation: Users are advised to upgrade to a firmware version that implements secure cookie handling practices, such as using the HttpOnly and Secure flags and ensuring that cookies are transmitted over HTTPS connections.
File Snapshot

[4.0K] /data/pocs/1d7edcc9f9f51f09352412806409be89994ab666 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.