Impact
The vulnerability resides in the httpTest method of the Alarm Preview component located at /api/monitor-api/alarm/previewData. An attacker can inject arbitrary SQL via crafted requests, enabling unauthorized read, modification, or deletion of monitoring data. The weakness corresponds to CWE‑74 (Improper Input Validation) and CWE‑89 (SQL Injection). The primary impact is loss of data confidentiality and integrity, and potential disruption of the monitoring service.
Affected Systems
AutohomeCorp frostmourne products up to version 1.0 are affected. Any deployment of the product that includes the Alarm Preview component and exposes the httpTest endpoint is at risk.
Risk and Exploitability
The CVSS score of 5.3 classifies the vulnerability as moderately severe. No EPSS score is available, and it is not listed in the CISA KEV catalog. attack vector is remote, initiated through HTTP requests to the previewData API. Public exploit code has already been released, indicating that the vulnerability is exploitable in practice. While exact exploitation likelihood cannot be quantified, the availability of exploit code raises concern for potential abuse.
OpenCVE Enrichment