A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00103}

epss

{'score': 0.0012}


Tue, 29 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda
Tenda ax2 Pro Firmware
Weaknesses CWE-78
CPEs cpe:2.3:o:tenda:ax2_pro_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ax2 Pro Firmware
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 16:45:00 +0000

Type Values Removed Values Added
Description A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-29T19:42:06.188Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48459

cve-icon Vulnrichment

Updated: 2024-10-29T19:41:52.305Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-25T17:15:04.703

Modified: 2024-10-29T20:35:32.737

Link: CVE-2024-48459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.