Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 06 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openwrt
Openwrt luci |
|
| Weaknesses | CWE-522 | |
| CPEs | cpe:2.3:a:openwrt:luci:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openwrt
Openwrt luci |
|
| Metrics |
cvssV3_1
|
Tue, 05 Nov 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the luci-mod-rpc package in OpenWRT Luci LTS allows for privilege escalation from an admin account to root via the JSON-RPC-API, which is exposed by the luci-mod-rpc package | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-06T19:35:21.074Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-51240
Updated: 2024-11-06T19:34:10.087Z
Status : Deferred
Published: 2024-11-05T19:15:07.283
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-51240
No data.
OpenCVE Enrichment
No data.