- Description
- OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execute OS commands on the device via the ‘php/dal.php’ endpoint, in the ‘arrSaveConfig’ parameter.
- Source
- cve-coordination@incibe.es
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 8.3
- Impact score
- 5.5
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
- Severity
- HIGH
- cve-coordination@incibe.es
- CWE-78
- Hype score
- Not currently trending
🚨 CVE-2024-8684 🔴 HIGH (8.3) 🏢 KUNBUS GmbH - Revolution Pi 🏗️ 2022-07-28-revpi-buster version 🔗 https://t.co/r5bibvJd3N #CyberCron #VulnAlert https://t.co/2pZHGSRyNf
@cybercronai
11 Feb 2025
56 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
1 Quote
CVE-2024-8684 OS Command Injection vulnerability in Revolution Pi version 2022-07-28-revpi-buster from KUNBUS GmbH. This vulnerability could allow an authenticated attacker to execut… https://t.co/4BaRHrjtgg
@CVEnew
10 Feb 2025
423 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-8684: HIGH] Critical OS Command Injection vulnerability discovered in Revolution Pi version 2022-07-28-revpi-buster by KUNBUS GmbH. Attackers can execute commands through the 'php/dal.php' endpoint using...#cybersecurity,#vulnerability https://t.co/xRLXgBbQuk https://t.
@CveFindCom
10 Feb 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes