A vulnerability in RhinOS 3.0-1190 could allow PHP code injection through the "search" parameter in /portal/search.htm. This vulnerability could allow a remote attacker to perform a reverse shell on the remote system, compromising the entire infrastructure.
Fixes

Solution

The manufacturer recommends upgrading RhinOS to the most recent version (see References).


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01708}

epss

{'score': 0.01194}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00954}

epss

{'score': 0.01708}


Thu, 05 Jun 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:saltos:rhinos:3.0-1190:*:*:*:*:*:*:* cpe:2.3:a:saltos:rhinos:3.0:1190:*:*:*:*:*:*

Wed, 04 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Saltos
Saltos rhinos
CPEs cpe:2.3:o:saltos:rhinos:3.0-1190:*:*:*:*:*:*:*
Vendors & Products Saltos
Saltos rhinos

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-08-01T21:11:12.773Z

Reserved: 2024-05-27T07:26:25.583Z

Link: CVE-2024-5407

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.773Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-27T13:15:08.573

Modified: 2025-06-05T13:23:10.207

Link: CVE-2024-5407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.