First published: Thu Sep 10 2020(Updated: )
Atop Technology industrial 3G/4G gateway contains Command Injection vulnerability. Due to insufficient input validation, the device's web management interface allows attackers to inject specific code and execute system commands without privilege.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Atoptechnology Se5901 | >=1.18<=1.40 | |
Atop | ||
Atoptechnology SE5901B Firmware | >=1.18<=1.40 | |
Atoptechnology SE5901B Firmware | ||
Atoptechnology Se5904d | >=1.18<=1.40 | |
Atoptechnology SE5904D Firmware | ||
Atoptechnology Se5908 | >=1.18<=1.40 | |
Atop Technology SE5908A | ||
Atoptechnology Se5908a | >=1.18<=1.40 | |
Atop Technology SE5908A | ||
Atoptechnology Se5916 | >=1.18<=1.40 | |
Atop | ||
Atoptechnology Se5916a | >=1.18<=1.40 | |
Atop |
Update Firmware series to V1.51
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-24552 is critical due to the command injection vulnerability that allows attackers to execute system commands without privilege.
To fix CVE-2020-24552, update the Atop Technology devices to the latest firmware version that is higher than 1.40.
CVE-2020-24552 affects various Atop Technology industrial 3G/4G gateway firmware versions between 1.18 and 1.40.
CVE-2020-24552 is a command injection vulnerability resulting from insufficient input validation.
Yes, CVE-2020-24552 can lead to unauthorized access and control over affected systems due to its command injection nature.