First published: Tue Oct 08 2024(Updated: )
A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola CX2L Router | <1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45880 is classified as a high severity vulnerability due to the potential for command injection.
CVE-2024-45880 affects the Motorola CX2L router by allowing unauthorized command execution through improper input handling in the SetStationSettings function.
To fix CVE-2024-45880, it is recommended to update the Motorola CX2L router to a version higher than 1.0.2, where the vulnerability is patched.
Users of Motorola CX2L routers running version 1.0.2 or earlier are affected by CVE-2024-45880.
A command injection vulnerability like CVE-2024-45880 allows an attacker to execute arbitrary commands on the system by submitting malicious input.