CVE-2024-48766

HIGH EXPLOITED NUCLEI

Netalertx < 24.10.12 - Path Traversal

Title source: rule

Description

NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.

Exploits (2)

github WORKING POC 4 stars
by halilkirazkaya · poc
https://github.com/halilkirazkaya/cve-poc-garage/tree/main/2024/CVE-2024-48766.md
metasploit WORKING POC
by chebuya, msutovsky-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/netalertx_file_read.rb

Nuclei Templates (1)

NetAlert X - Arbitary File Read
CRITICALVERIFIEDby s4e-io
FOFA: NetAlert X

Scores

CVSS v3 8.6
EPSS 0.7766
EPSS Percentile 99.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Details

VulnCheck KEV 2025-05-12
CWE
CWE-22 CWE-698
Status published
Products (1)
netalertx/netalertx 24.7.18 - 24.10.12
Published May 13, 2025
Tracked Since Feb 18, 2026