mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
64 lines
2.0 KiB
JSON
64 lines
2.0 KiB
JSON
{
|
|
"id": "CVE-2024-45721",
|
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
|
"published": "2024-12-23T01:15:07.200",
|
|
"lastModified": "2024-12-23T01:15:07.200",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C contain an OS command injection vulnerability in the HOST name configuration screen. An arbitrary OS command may be executed with the root privilege by an administrative user."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "home 5G HR02, Wi-Fi STATION SH-52B y Wi-Fi STATION SH-54C contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la pantalla de configuraci\u00f3n del nombre del HOST. Un usuario administrativo puede ejecutar un comando arbitrario del sistema operativo con privilegios de superusuario."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "vultures@jpcert.or.jp",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "vultures@jpcert.or.jp",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://jvn.jp/en/jp/JVN61635834/",
|
|
"source": "vultures@jpcert.or.jp"
|
|
},
|
|
{
|
|
"url": "https://k-tai.sharp.co.jp/support/info/info083.html",
|
|
"source": "vultures@jpcert.or.jp"
|
|
}
|
|
]
|
|
} |