An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
References
Configurations
No configuration.
History
04 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
References | () https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2024-53944-Whitepaper.pdf - | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
27 Feb 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 20:16
Updated : 2025-03-04 15:15
NVD link : CVE-2024-53944
Mitre link : CVE-2024-53944
CVE.ORG link : CVE-2024-53944
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')