Description
F-logic DataCube3 v1.0 is affected by command injection due to improper string filtering at the command execution point in the ./admin/transceiver_schedule.php file. An unauthenticated remote attacker can exploit this vulnerability by sending a file name containing command injection. Successful exploitation of this vulnerability may allow the attacker to execute system commands.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-35097 | F-logic DataCube3 v1.0 is affected by command injection due to improper string filtering at the command execution point in the ./admin/transceiver_schedule.php file. An unauthenticated remote attacker can exploit this vulnerability by sending a file name containing command injection. Successful exploitation of this vulnerability may allow the attacker to execute system commands. |
References
History
Tue, 10 Jun 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F-logic datacube3 Firmware
|
|
| CPEs | cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:* cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
F-logic datacube3 Firmware
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:53:27.776Z
Reserved: 2024-05-09T00:00:00.000Z
Link: CVE-2024-34852
Updated: 2024-08-02T02:59:22.729Z
Status : Analyzed
Published: 2024-05-28T17:15:10.303
Modified: 2025-06-10T17:21:00.860
Link: CVE-2024-34852
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD