Overview
- Description
- Command injection vulnerability in the Edge Computing UI for the TRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an attacker with write access to the web UI can execute commands on the device with root privileges, far more extensive than what the write privilege intends.
- Source
- cybersecurity@hitachienergy.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
『an attacker with write access to the web UI can execute commands on the device with root privileges,』 CVE-2024-41153 CVE-2024-41156 Multiple vulnerabilities in Hitachi Energy TRO600 series products https://t.co/MYAoPtXe81
@autumn_good_35
30 Oct 2024
274 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-41153 Command injection vulnerability in the Edge Computing UI for the TRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an att… https://t.co/9SfK1EKlsM
@CVEnew
29 Oct 2024
279 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5C2D2E0-5383-44E5-B8C6-C743503A8E51", "versionEndExcluding": "9.2.0.5", "versionStartIncluding": "9.1.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B3A46C6E-9314-40EB-A8BE-0D3A26B5FE4C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BE01813-8087-4E9B-8B2B-FF813C0E9506", "versionEndExcluding": "9.2.0.5", "versionStartIncluding": "9.1.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC979E74-6316-4BED-87A6-4DC9B9747E0F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6A94F87-2875-46C9-8BD3-BE3EA9F71648", "versionEndExcluding": "9.2.0.5", "versionStartIncluding": "9.1.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E84F6910-1D58-4AE7-94EF-797C9BD52690" } ], "operator": "OR" } ], "operator": "AND" } ]