CVE-2024-41788

A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the input parameters in specific GET requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:7kt_pac1260_data_manager_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7kt_pac1260_data_manager:-:*:*:*:*:*:*:*

History

23 Sep 2025, 16:38

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/html/ssa-187636.html - () https://cert-portal.siemens.com/productcert/html/ssa-187636.html - Vendor Advisory
CPE cpe:2.3:o:siemens:7kt_pac1260_data_manager_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7kt_pac1260_data_manager:-:*:*:*:*:*:*:*
Summary
  • (es) Se ha identificado una vulnerabilidad en el gestor de datos SENTRON 7KT PAC1260 (todas las versiones). La interfaz web de los dispositivos afectados no depura los parámetros de entrada en solicitudes GET específicas. Esto podría permitir que un atacante remoto autenticado ejecute código arbitrario con privilegios de root.
First Time Siemens 7kt Pac1260 Data Manager Firmware
Siemens
Siemens 7kt Pac1260 Data Manager

08 Apr 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-08 09:15

Updated : 2025-09-23 16:38


NVD link : CVE-2024-41788

Mitre link : CVE-2024-41788

CVE.ORG link : CVE-2024-41788


JSON object : View

Products Affected

siemens

  • 7kt_pac1260_data_manager
  • 7kt_pac1260_data_manager_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')