AI description
CVE-2024-53944 involves a command injection vulnerability found in certain Tuoshi/Dionlink 4G Wi-Fi devices, specifically those running firmware versions M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and M7628xUSAxUIv2_v1.0.1481.15.02_P0. The vulnerability exists in the `/goform/formJsonAjaxReq` endpoint, which doesn't properly sanitize shell metacharacters within JSON parameters. This flaw allows a remote, unauthenticated attacker with network access to inject and execute arbitrary operating system commands with root privileges. The vulnerability has been acknowledged by the vendor, Shenzhen Tuoshi Network Communications Co.,Ltd / Dionlink. The researcher who discovered this vulnerability is Edward Warren.
- Description
- An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-94
- Hype score
- Not currently trending
🚨 CVE-2024-53944 ❓ 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/aYcXCotlTg 🔗 https://t.co/wlNQJl8s3w 🔗 https://t.co/h6F5CRV8ed 🔗 https://t.co/VmUjsccj8V 🔗 https://t.co/L54gaaGL2h #CyberCron #VulnAlert https://t.co/U2LaSnTIn8
@cybercronai
1 Mar 2025
887 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
1 Quote
CVE-2024-53944 02/27/2025 08:16:01 PM An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remot... https://t.co/Qi7ET5wYd7
@CVETracker
28 Feb 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes