cve/2024/CVE-2024-7344.md
2025-09-29 16:08:36 +00:00

29 lines
1.7 KiB
Markdown

### [CVE-2024-7344](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7344)
![](https://img.shields.io/static/v1?label=Product&message=CES%20NeoImpact&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GreenGuard&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=HDD%20King&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SANFONG%20EZ-Back%20System&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SmartRecovery&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SysReturn%20(32-bit%20and%2064-bit)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%2010.1.024-20241127%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%2010.2.023-20240927%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%2010.2.02320240919%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%2010.3.021-20241127%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%2010.3.024-20241127%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%2011.2.023-20240927%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%3A%20Lack%2FImproper%20Verification%20of%20Cryptographic%20Signature&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426%3A%20Untrusted%20Search%20Path&color=brighgreen)
### Description
Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/francolop/0XC0DE-TP3