### [CVE-2024-24781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24781) ![](https://img.shields.io/static/v1?label=Product&message=F-COM%2001%20coated&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F-COM%2001&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F-CPU%2001%20coated&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F-CPU%2001&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F30%2003X%20YY%20(COM)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F30%2003X%20YY%20(CPU)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F35%2003X%20YY%20(COM)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F35%2003X%20YY%20(CPU)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F60%20CPU%2003X%20YY%20(COM)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=F60%20CPU%2003X%20YY%20(CPU)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=X-COM%2001%20E%20YY&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=X-COM%2001%20YY&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=X-CPU%2001&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=X-CPU%2031&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=X-SB%2001&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2014.12%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2014.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2015.14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2018.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2024.14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%207.54%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Uncontrolled%20Resource%20Consumption&color=brighgreen) ### Description An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port.  ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds