Description
A vulnerability, which was classified as critical, has been found in cym1102 nginxWebUI up to 3.9.9. This issue affects the function exec of the file /adminPage/conf/reload. The manipulation of the argument nginxExe leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260579.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32314 | A vulnerability, which was classified as critical, has been found in cym1102 nginxWebUI up to 3.9.9. This issue affects the function exec of the file /adminPage/conf/reload. The manipulation of the argument nginxExe leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260579. |
References
History
Thu, 21 Aug 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cym1102
Cym1102 nginxwebui |
|
| CPEs | cpe:2.3:a:cym1102:nginxwebui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cym1102
Cym1102 nginxwebui |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-12T13:11:49.334Z
Reserved: 2024-04-12T19:33:40.566Z
Link: CVE-2024-3740
Updated: 2024-08-01T20:20:01.071Z
Status : Analyzed
Published: 2024-04-13T21:15:48.353
Modified: 2025-08-21T00:50:14.267
Link: CVE-2024-3740
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD