CVE-2024-43652 – “Iocharger AC Firmware Command Injection Vulnerability”

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability allows OS Command Injection as root This issue affects Iocharger firmware for AC model chargers before version 24120701 Likelihood: Moderate – The binary does not seem to be used by the web interface, so it might be more difficult to find. It seems […]

CVE-2024-43651 – Iocharger AC Model Command Injection Vulnerability

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability allows OS Command Injection as root This issue affects Iocharger firmware for AC models before version 241207101 Likelihood: Moderate – The binary does not seem to be used by the web interface, so it might be more difficult to find. It seems to […]

CVE-2024-43650 – “Command Injection Vulnerability in Iocharger AC Firmware”

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability in Iocharger firmware for AC models allows OS Command Injection as root This issue affects  firmware versions before 24120701. Likelihood: Moderate – The binary does not seem to be used by the web interface, so it might be more difficult to find. It […]

CVE-2024-43649 – Iocharger AC Model Authenticated Root RCE through Command Injection

Authenticated command injection in the filename of a .exe request leads to remote code execution as the root user. This issue affects Iocharger firmware for AC models before version 24120701. Likelihood: Moderate – This action is not a common place for command injection vulnerabilities to occur. Thus, an attacker will likely only be able to […]

CVE-2024-43648 – Iocharger AC Firmware Root Command Injection Vulnerability

Command injection in the parameter of a .exe request leads to remote code execution as the root user. This issue affects Iocharger firmware for AC models before version 24120701. Likelihood: Moderate – This action is not a common place for command injection vulnerabilities to occur. Thus, an attacker will likely only be able to find […]

CVE-2024-40765 – SonicOS Integer-Based Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2024-40765 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]

CVE-2024-12806 – SonicOS Absolute Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2024-12806 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]

CVE-2024-12805 – SonicOS Format String Vulnerability (Crash/RCE)

The following table lists the changes that have been made to the CVE-2024-12805 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]

CVE-2024-12803 – SonicOS Remote Code Execution Buffer Overflow Vulnerability

The following table lists the changes that have been made to the CVE-2024-12803 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]

CVE-2023-1907 – “pgAdmin LDAP Authentication Session Hijacking Vulnerability”

The following table lists the changes that have been made to the CVE-2023-1907 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 09, 2025 Action […]