CVE-2024-48766
HIGH EXPLOITED NUCLEINetalertx < 24.10.12 - Path Traversal
Title source: ruleDescription
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
Exploits (2)
github
WORKING POC
4 stars
by halilkirazkaya · poc
https://github.com/halilkirazkaya/cve-poc-garage/tree/main/2024/CVE-2024-48766.md
metasploit
WORKING POC
by chebuya, msutovsky-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/netalertx_file_read.rb
Nuclei Templates (1)
NetAlert X - Arbitary File Read
CRITICALVERIFIEDby s4e-io
FOFA:
NetAlert X
Scores
CVSS v3
8.6
EPSS
0.7766
EPSS Percentile
99.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Details
VulnCheck KEV
2025-05-12
CWE
CWE-22
CWE-698
Status
published
Products (1)
netalertx/netalertx
24.7.18 - 24.10.12
Published
May 13, 2025
Tracked Since
Feb 18, 2026