The specific flaw exists within the UpLoadServlet class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22724.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-24-563/ |
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Oct 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netgear
Netgear prosafe Network Management System |
|
| CPEs | cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Netgear
Netgear prosafe Network Management System |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-01T21:18:05.352Z
Reserved: 2024-05-29T21:30:18.144Z
Link: CVE-2024-5505
Updated: 2024-08-01T21:18:05.352Z
Status : Modified
Published: 2024-06-06T18:15:21.423
Modified: 2024-11-21T09:47:50.067
Link: CVE-2024-5505
No data.
OpenCVE Enrichment
No data.