Количество 3
Количество 3
CVE-2024-50359
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands.
GHSA-rfw8-876c-83jf
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands.
BDU:2024-11173
Уязвимость прикладного программного интерфейса «scan_ap» микропрограммного обеспечения многофункциональных беспроводных точек доступа Advantech EKI-6333AC-2G, EKI-6333AC-2GD и EKI-6333AC-1GPO, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-50359 A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands. | CVSS3: 7.2 | 0% Низкий | около 1 года назад | |
GHSA-rfw8-876c-83jf A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands. | CVSS3: 7.2 | 0% Низкий | около 1 года назад | |
BDU:2024-11173 Уязвимость прикладного программного интерфейса «scan_ap» микропрограммного обеспечения многофункциональных беспроводных точек доступа Advantech EKI-6333AC-2G, EKI-6333AC-2GD и EKI-6333AC-1GPO, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.2 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу