Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5063 | OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter. |
Solution
The command injection vulnerability has been fixed by the KUNBUS team in the Revolution Pi webstatus 2.4.2 release. Path Traversal vulnerability has been fixed by the KUNBUS team in Revolution Pi pictory 2.1.1.
Workaround
No workaround given by the vendor.
Mon, 10 Feb 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter. | |
| Title | OS Command Injection vulnerability in Revolution Pi | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-02-12T15:43:30.941Z
Reserved: 2024-09-11T08:12:14.979Z
Link: CVE-2024-8684
No data.
Status : Received
Published: 2025-02-10T13:15:26.103
Modified: 2025-02-10T13:15:26.103
Link: CVE-2024-8684
No data.
OpenCVE Enrichment
No data.
EUVD