Vulnerability in admin_ip.php in Seacms v13.1, when action=set, allows attackers to control IP parameters that are written to the data/admin/ip.php file and could result in arbitrary command execution.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 28 Mar 2025 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:seacms:seacms:13.1:*:*:*:*:*:*:*

Fri, 30 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Seacms
Seacms seacms
Weaknesses CWE-77
CPEs cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*
Vendors & Products Seacms
Seacms seacms
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Aug 2024 16:15:00 +0000

Type Values Removed Values Added
Description Vulnerability in admin_ip.php in Seacms v13.1, when action=set, allows attackers to control IP parameters that are written to the data/admin/ip.php file and could result in arbitrary command execution.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-30T16:42:55.398Z

Reserved: 2024-08-21T00:00:00

Link: CVE-2024-44916

cve-icon Vulnrichment

Updated: 2024-08-30T16:42:49.332Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-30T16:15:09.623

Modified: 2025-03-28T17:12:43.010

Link: CVE-2024-44916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.