No analysis available yet.
Vendor Solution
The vendor provides a firmware update to version 7.40, which can be downloaded via the vendor's customer server portal.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 11 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 10 Dec 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized. | |
| Title | OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T21:54:20.568Z
Reserved: 2024-03-05T09:15:40.201Z
Link: CVE-2024-28138
Updated: 2025-11-03T21:54:20.568Z
Status : Awaiting Analysis
Published: 2024-12-10T08:15:18.943
Modified: 2025-11-03T22:16:49.463
Link: CVE-2024-28138
No data.
OpenCVE Enrichment
No data.