### [CVE-2024-25386](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25386) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Directory Traversal vulnerability in DICOMĀ® Connectivity Framework by laurelbridge before v.2.7.6b allows a remote attacker to execute arbitrary code via the format_logfile.pl file. ### POC #### Reference - https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2 - https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/ #### Github - https://github.com/fkie-cad/nvd-json-data-feeds