CVE-2024-44722

SysAK v2.0 and before is vulnerable to command execution via aaa;cat /etc/passwd.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anolis:sysak:*:*:*:*:*:*:*:*

History

14 Apr 2026, 20:48

Type Values Removed Values Added
First Time Anolis
Anolis sysak
References () https://gist.github.com/0x00dream2/9984c109101c0b1e352f8ee9ad5e40fe#file-cve-2024-44722 - () https://gist.github.com/0x00dream2/9984c109101c0b1e352f8ee9ad5e40fe#file-cve-2024-44722 - Third Party Advisory
References () https://gitee.com/anolis/sysak - () https://gitee.com/anolis/sysak - Product
CPE cpe:2.3:a:anolis:sysak:*:*:*:*:*:*:*:*
Summary
  • (es) SysAK v2.0 y versiones anteriores son vulnerables a la ejecución de comandos a través de «aaa;cat /etc /passwd».

23 Mar 2026, 14:16

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

20 Mar 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 14:16

Updated : 2026-04-14 20:48


NVD link : CVE-2024-44722

Mitre link : CVE-2024-44722

CVE.ORG link : CVE-2024-44722


JSON object : View

Products Affected

anolis

  • sysak
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')