Executive Summary

Informations
Name CVE-2024-44809 First vendor Publication 2024-09-03
Vendor Cve Last vendor Modification 2024-09-04

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the "position" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44809

Sources (Detail)

https://github.com/recantha/camera-pi/blob/ef018d212288cb16404f0b050593d20f0d...
https://jacobmasse.medium.com/cve-2024-44809-remote-code-execution-in-raspber...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-09-04 17:27:23
  • Multiple Updates
2024-09-04 05:27:24
  • First insertion