The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Atelmo
Atelmo atemio Am 520 Hd Firmware |
|
CPEs | cpe:2.3:o:atelmo:atemio_am_520_hd_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Atelmo
Atelmo atemio Am 520 Hd Firmware |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access. | |
Title | OS Command Injection in Atelmo Atemio AM 520 HD Full HD Satellite Receiver | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-26T18:23:52.328Z
Reserved: 2024-09-24T19:19:58.951Z
Link: CVE-2024-9166

Updated: 2024-09-26T17:54:57.622Z

Status : Awaiting Analysis
Published: 2024-09-26T17:15:04.460
Modified: 2024-09-30T12:46:20.237
Link: CVE-2024-9166

No data.