{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-48860","assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","state":"PUBLISHED","assignerShortName":"qnap","dateReserved":"2024-10-09T00:22:57.834Z","datePublished":"2024-11-22T15:32:07.455Z","dateUpdated":"2024-11-22T16:39:54.901Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"QuRouter","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"2.4.3.103","status":"affected","version":"2.4.x","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Midnight Blue / PHP Hooligans"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.<br><br>We have already fixed the vulnerability in the following version:<br>QuRouter 2.4.3.103 and later<br>"}],"value":"An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":9.5,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-77","description":"CWE-77","lang":"en","type":"CWE"},{"cweId":"CWE-78","description":"CWE-78","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap","dateUpdated":"2024-11-22T15:32:07.455Z"},"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-24-44"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"We have already fixed the vulnerability in the following version:<br>QuRouter 2.4.3.103 and later<br>"}],"value":"We have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"}],"source":{"advisory":"QSA-24-44","discovery":"EXTERNAL"},"title":"QHora","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"qnap","product":"qurouter","cpes":["cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.4.0","status":"affected","lessThan":"2.4.3.103","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-22T16:39:38.535540Z","id":"CVE-2024-48860","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-22T16:39:54.901Z"}}]}}