An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
cvssV3_1
|
Thu, 27 Feb 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges. | |
References |
|
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-27T00:00:00.000Z
Updated: 2025-03-04T14:34:58.859Z
Reserved: 2024-11-25T00:00:00.000Z
Link: CVE-2024-53944

Updated: 2025-03-04T14:34:44.112Z

Status : Awaiting Analysis
Published: 2025-02-27T20:16:01.887
Modified: 2025-03-04T15:15:19.667
Link: CVE-2024-53944

No data.