CVE-2024-53944

An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
Configurations

No configuration.

History

04 Mar 2025, 15:15

Type Values Removed Values Added
CWE CWE-94
References () https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2024-53944-Whitepaper.pdf - () https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2024-53944-Whitepaper.pdf -
Summary
  • (es) Se descubrió un problema en los dispositivos Tuoshi/Dionlink LT15D 4G Wi-Fi a través de M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 y en los dispositivos LT21B a través de M7628xUSAxUIv2_v1.0.1481.15.02_P0. Un atacante remoto no autenticado con acceso a la red puede aprovechar una vulnerabilidad de inyección de comandos. El endpoint /goform/formJsonAjaxReq no pueden depurar los metacaracteres del shell enviados a través de parámetros JSON, lo que permite a los atacantes ejecutar comandos arbitrarios del sistema operativo con privilegios de superusuario.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

27 Feb 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 20:16

Updated : 2025-03-04 15:15


NVD link : CVE-2024-53944

Mitre link : CVE-2024-53944

CVE.ORG link : CVE-2024-53944


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')