Description
An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.
Published: 2024-12-10
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The vendor provides a firmware update to version 7.40, which can be downloaded via the vendor's customer server portal.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00213}

epss

{'score': 0.00239}


Wed, 11 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 07:45:00 +0000

Type Values Removed Values Added
Description An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.
Title OS Command Injection
Weaknesses CWE-78
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-03T21:54:20.568Z

Reserved: 2024-03-05T09:15:40.201Z

Link: CVE-2024-28138

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:20.568Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-10T08:15:18.943

Modified: 2025-11-03T22:16:49.463

Link: CVE-2024-28138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses