First published: Tue May 28 2024(Updated: )
F-logic DataCube3 v1.0 is affected by command injection due to improper string filtering at the command execution point in the ./admin/transceiver_schedule.php file. An unauthenticated remote attacker can exploit this vulnerability by sending a file name containing command injection. Successful exploitation of this vulnerability may allow the attacker to execute system commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F-logic Datacube3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34852 is considered a critical vulnerability due to its potential for remote command injection.
To fix CVE-2024-34852, ensure proper string validation and filtering mechanisms are in place in the ./admin/transceiver_schedule.php file.
CVE-2024-34852 affects users of F-logic DataCube3 v1.0 who have not implemented security measures against command injection.
Yes, CVE-2024-34852 can be exploited remotely by an unauthenticated attacker through command injection.
Exploiting CVE-2024-34852 can allow attackers to execute arbitrary commands on the server, potentially leading to full system compromise.