Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42657 PoC — Nepstech NTPL-XPON1GFEVN 安全漏洞

Source
Associated Vulnerability
Title:Nepstech NTPL-XPON1GFEVN 安全漏洞 (CVE-2024-42657)
Description:Nepstech NTPL-XPON1GFEVN是Nepstech公司的一款无线路由器。 Nepstech NTPL-XPON1GFEVN v1.0版本存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
Description
CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.
Readme
# CVE-2024-42657
CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.


CVE-2024-42657:

Summary: A vulnerability in the wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows an unauthenticated, remote attacker to obtain sensitive information during the login process. The issue arises due to the lack of encryption when transmitting login credentials, making it susceptible to interception via man-in-the-middle (MITM) attacks.

Details: The wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 transmits sensitive information, including login credentials, over an unencrypted HTTP connection during the login process. This lack of encryption allows attackers who can intercept the traffic to capture and exploit the credentials. This vulnerability can lead to unauthorized access to the router's management interface and potential further exploitation of the device.

Impact: Successful exploitation of this vulnerability allows an attacker to capture sensitive information, including user credentials, potentially leading to unauthorized access and control over the router.

Affected Versions: wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0

Remediation: Users are advised to upgrade to a firmware version that enforces HTTPS encryption during the login process. Alternatively, users should consider deploying network-level encryption (such as VPNs) to secure their communications
File Snapshot

[4.0K] /data/pocs/fc0c940d20066475eb61759fe1df96aeb597367a └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.