Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 04 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server. | |
| Title | Easywall 0.3.1 - Authentication Bypass via Command Injection in /ports-save Endpoint | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-04T20:41:13.750Z
Reserved: 2025-12-04T16:01:43.113Z
Link: CVE-2024-58275
No data.
Status : Received
Published: 2025-12-04T21:16:07.360
Modified: 2025-12-04T21:16:07.360
Link: CVE-2024-58275
No data.
OpenCVE Enrichment
No data.
Weaknesses