An issue was discovered in Italtel Embrace 1.6.4. The Web application does not properly check the parameters sent as input before they are processed on the server side. This allows authenticated users to execute commands on the Operating System.
References
Link | Resource |
---|---|
https://www.gruppotim.it/it/footer/red-team.html | Exploit Third Party Advisory |
https://www.gruppotim.it/it/footer/red-team.html | Exploit Third Party Advisory |
Configurations
History
21 May 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:* | |
References | () https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory | |
First Time |
Italtel embrace
Italtel |
21 Nov 2024, 09:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.gruppotim.it/it/footer/red-team.html - |
03 Jul 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.1 |
CWE | CWE-78 |
24 May 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-23 19:16
Updated : 2025-05-21 18:18
NVD link : CVE-2024-31843
Mitre link : CVE-2024-31843
CVE.ORG link : CVE-2024-31843
JSON object : View
Products Affected
italtel
- embrace
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')