Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vendor provides a firmware update to version 7.40 (or higher) which can be downloaded via the vendor's customer server portal.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword. | |
| Title | Unauthenticated SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T21:54:31.104Z
Reserved: 2024-03-05T09:15:40.202Z
Link: CVE-2024-28145
Updated: 2025-11-03T21:54:31.104Z
Status : Awaiting Analysis
Published: 2024-12-12T14:15:22.467
Modified: 2025-11-03T22:16:50.503
Link: CVE-2024-28145
No data.
OpenCVE Enrichment
No data.