OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-5063 OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter.
Fixes

Solution

The command injection vulnerability has been fixed by the KUNBUS team in the Revolution Pi webstatus 2.4.2 release. Path Traversal vulnerability has been fixed by the KUNBUS team in Revolution Pi pictory 2.1.1.


Workaround

No workaround given by the vendor.

History

Mon, 10 Feb 2025 13:00:00 +0000

Type Values Removed Values Added
Description OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter.
Title OS Command Injection vulnerability in Revolution Pi
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-02-12T15:43:30.941Z

Reserved: 2024-09-11T08:12:14.979Z

Link: CVE-2024-8684

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-02-10T13:15:26.103

Modified: 2025-02-10T13:15:26.103

Link: CVE-2024-8684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses