CVE-2024-39209

luci-app-sms-tool v1.9-6 was discovered to contain a command injection vulnerability via the score parameter.
Configurations

No configuration.

History

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://gist.github.com/yanggao017/e392a633b8cee6f42c514b125860081c - () https://gist.github.com/yanggao017/e392a633b8cee6f42c514b125860081c -
References () https://github.com/yanggao017/vuln/blob/main/luci-app-sms-tool.md - () https://github.com/yanggao017/vuln/blob/main/luci-app-sms-tool.md -

01 Aug 2024, 13:55

Type Values Removed Values Added
CWE CWE-94
Summary
  • (es) Se descubrió que luci-app-sms-tool v1.9-6 contiene una vulnerabilidad de inyección de comandos a través del parámetro de puntuación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3

27 Jun 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-27 21:15

Updated : 2024-11-21 09:27


NVD link : CVE-2024-39209

Mitre link : CVE-2024-39209

CVE.ORG link : CVE-2024-39209


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')