No analysis available yet.
Vendor Solution
The vendor provides a firmware update to version 7.42 (or higher) which can be downloaded via the vendor's customer server portal.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter. | |
| Title | SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T22:28:22.570Z
Reserved: 2024-10-25T07:26:12.627Z
Link: CVE-2024-50584
Updated: 2024-12-13T16:08:42.512Z
Status : Awaiting Analysis
Published: 2024-12-12T14:15:22.833
Modified: 2025-11-03T23:17:13.197
Link: CVE-2024-50584
No data.
OpenCVE Enrichment
No data.