F-logic DataCube3 v1.0 is affected by command injection due to improper string filtering at the command execution point in the ./admin/transceiver_schedule.php file. An unauthenticated remote attacker can exploit this vulnerability by sending a file name containing command injection. Successful exploitation of this vulnerability may allow the attacker to execute system commands.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2024-35097 | F-logic DataCube3 v1.0 is affected by command injection due to improper string filtering at the command execution point in the ./admin/transceiver_schedule.php file. An unauthenticated remote attacker can exploit this vulnerability by sending a file name containing command injection. Successful exploitation of this vulnerability may allow the attacker to execute system commands. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Tue, 10 Jun 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        F-logic datacube3 Firmware
         | 
|
| CPEs | cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:* cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        F-logic datacube3 Firmware
         | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:53:27.776Z
Reserved: 2024-05-09T00:00:00.000Z
Link: CVE-2024-34852
Updated: 2024-08-02T02:59:22.729Z
Status : Analyzed
Published: 2024-05-28T17:15:10.303
Modified: 2025-06-10T17:21:00.860
Link: CVE-2024-34852
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD