### [CVE-2024-45416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45416) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=TTN.1T1_211029%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V1.0.0.2B1.1000%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V1.0.0.2B4.3000%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V1.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V1.0.1.1B2.1000%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V1.5.0_H3A.1T9P1-o%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V2.6.20.ROST12%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=V3.5.5_CO.1T1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root. ### POC #### Reference No PoCs from references. #### Github - https://github.com/TasosY2K/zte-router-0day-rce - https://github.com/fkie-cad/nvd-json-data-feeds