Korenix JetPort 5601 Vulnerability: When Your Device is Old Enough to Retire but Still Causes Trouble!
St. Poelten UAS unveils a path traversal vulnerability in the Korenix JetPort 5601. This discovery allows unauthenticated users to joyride through sensitive system files. With the device being end-of-life, CyberDanube’s sage advice? Upgrade to a newer device and maybe invest in a digital lock or two!

Hot Take:
Oh, Korenix JetPort 5601, you’re like that ancient computer in the corner of the office running Windows 95. You’ve served us well, but it’s time to accept that your path traversal issues are the final straw. Let’s face it, you’re the security equivalent of a ’90s dial-up modem.
Key Points:
- Korenix JetPort 5601 is vulnerable to a path traversal attack (CVE-2024-11303).
- The vulnerability allows unauthenticated access to the device’s operating system.
- No fixes are planned as the device is officially end-of-life.
- Users are advised to limit access and consider upgrading to a newer device.
- CyberDanube coordinated the research and disclosure of this vulnerability.
Already a member? Log in here