CVE-2024-13129

A vulnerability was found in Roxy-WI up to 8.1.3. It has been declared as critical. Affected by this vulnerability is the function action_service of the file app/modules/roxywi/roxy.py. The manipulation of the argument action/service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 8.1.4 is able to address this issue. The identifier of the patch is 32313928eb9ce906887b8a30bf7b9a3d5c0de1be. It is recommended to upgrade the affected component.
Configurations

No configuration.

History

26 Aug 2025, 21:15

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en Roxy-WI hasta la versión 8.1.3. Se ha declarado como crítica. La función action_service del archivo app/modules/roxywi/roxy.py está afectada por esta vulnerabilidad. La manipulación del argumento action/service provoca la inyección de comandos del sistema operativo. El ataque se puede ejecutar de forma remota. El exploit se ha hecho público y puede utilizarse. La actualización a la versión 8.1.4 puede solucionar este problema. El identificador del parche es 32313928eb9ce906887b8a30bf7b9a3d5c0de1be. Se recomienda actualizar el componente afectado.

03 Jan 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-03 22:15

Updated : 2025-08-26 21:15


NVD link : CVE-2024-13129

Mitre link : CVE-2024-13129

CVE.ORG link : CVE-2024-13129


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')