### [CVE-2024-24914](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24914) ![](https://img.shields.io/static/v1?label=Product&message=ClusterXL%2C%20Multi-Domain%20Security%20Management%2C%20Quantum%20Appliances%2C%20Quantum%20Maestro%2C%20Quantum%20Scalable%20Chassis%2C%20Quantum%20Security%20Gateways%2C%20Quantum%20Security%20Management&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Check%20Point%20Quantum%20Gateways%20versions%20R81%2C%20R81.10%2C%20R81.20%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-914%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables&color=brighgreen) ### Description Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available. ### POC #### Reference No PoCs from references. #### Github - https://github.com/tylzars/awesome-vrre-writeups