A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-187636.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Sep 2025, 16:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/html/ssa-187636.html - Vendor Advisory | |
First Time |
Siemens 7kt Pac1260 Data Manager Firmware
Siemens Siemens 7kt Pac1260 Data Manager |
|
CPE | cpe:2.3:o:siemens:7kt_pac1260_data_manager_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:7kt_pac1260_data_manager:-:*:*:*:*:*:*:* |
08 Apr 2025, 18:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Apr 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-08 09:15
Updated : 2025-09-23 16:37
NVD link : CVE-2024-41789
Mitre link : CVE-2024-41789
CVE.ORG link : CVE-2024-41789
JSON object : View
Products Affected
siemens
- 7kt_pac1260_data_manager
- 7kt_pac1260_data_manager_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')