SysAK v2.0 and before is vulnerable to command execution via aaa;cat /etc/passwd.
References
| Link | Resource |
|---|---|
| https://gist.github.com/0x00dream2/9984c109101c0b1e352f8ee9ad5e40fe#file-cve-2024-44722 | Third Party Advisory |
| https://gitee.com/anolis/sysak | Product |
Configurations
History
14 Apr 2026, 20:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Anolis
Anolis sysak |
|
| References | () https://gist.github.com/0x00dream2/9984c109101c0b1e352f8ee9ad5e40fe#file-cve-2024-44722 - Third Party Advisory | |
| References | () https://gitee.com/anolis/sysak - Product | |
| CPE | cpe:2.3:a:anolis:sysak:*:*:*:*:*:*:*:* | |
| Summary |
|
23 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-94 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
20 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 14:16
Updated : 2026-04-14 20:48
NVD link : CVE-2024-44722
Mitre link : CVE-2024-44722
CVE.ORG link : CVE-2024-44722
JSON object : View
Products Affected
anolis
- sysak
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
