An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 11 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 10 Dec 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized. | |
| Title | OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-12-10T07:35:06.842Z
Updated: 2025-11-03T21:54:20.568Z
Reserved: 2024-03-05T09:15:40.201Z
Link: CVE-2024-28138
Updated: 2025-11-03T21:54:20.568Z
Status : Awaiting Analysis
Published: 2024-12-10T08:15:18.943
Modified: 2025-11-03T22:16:49.463
Link: CVE-2024-28138
No data.