An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
History

Tue, 04 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Feb 2025 19:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-27T00:00:00.000Z

Updated: 2025-03-04T14:34:58.859Z

Reserved: 2024-11-25T00:00:00.000Z

Link: CVE-2024-53944

cve-icon Vulnrichment

Updated: 2025-03-04T14:34:44.112Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-27T20:16:01.887

Modified: 2025-03-04T15:15:19.667

Link: CVE-2024-53944

cve-icon Redhat

No data.