cve/2024/CVE-2024-45416.md

27 lines
1.7 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-45416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45416)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=TTN.1T1_211029%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V1.0.0.2B1.1000%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V1.0.0.2B4.3000%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V1.0.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V1.0.1.1B2.1000%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V1.5.0_H3A.1T9P1-o%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V2.6.20.ROST12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V3.5.5_CO.1T1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TasosY2K/zte-router-0day-rce
2025-09-29 21:09:30 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00