First published: Wed Oct 09 2024(Updated: )
In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed.
Credit: security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Android | =13.0 | |
Android | =14.0 | |
Any of | ||
Unisoc S8000 Firmware | ||
Unisoc SC7731 | ||
Unisoc SC9832E Firmware | ||
Unisoc SC9863A Firmware | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
UniSoc T618 | ||
Unisoc T760 Firmware | ||
Unisoc T770 | ||
Unisoc T820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39436 is classified as a high-severity vulnerability due to its potential for local privilege escalation.
CVE-2024-39436 affects Google Android versions 13.0 and 14.0 due to improper input validation leading to command injection.
To fix CVE-2024-39436, upgrade the affected Google Android versions to the latest security patches provided by Google.
CVE-2024-39436 can be exploited through command injection attacks that leverage improper input validation.
If you are using Google Android version 13.0 or 14.0, your device may be vulnerable to CVE-2024-39436.