{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-58337","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-26T17:10:59.894Z","datePublished":"2025-12-30T22:41:44.989Z","dateUpdated":"2026-01-16T19:00:19.517Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-01-16T19:00:19.517Z"},"datePublic":"2024-11-26T00:00:00.000Z","title":"Akuvox Smart Intercom S539 Improper Access Control via ServicesHTTPAPI","descriptions":[{"lang":"en","value":"Akuvox Smart Intercom S539 contains an improper access control vulnerability that allows users with 'User' privileges to modify API access settings and configurations. Attackers can exploit this vulnerability to escalate privileges and gain unauthorized access to administrative functionalities."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Missing Authorization","cweId":"CWE-862","type":"CWE"}]}],"affected":[{"vendor":"The Akuvox Company","product":"Akuvox Smart Doorphone","versions":[{"version":"S539","status":"affected"},{"version":"S532","status":"affected"},{"version":"X916","status":"affected"},{"version":"X915","status":"affected"},{"version":"X912","status":"affected"}]},{"vendor":"The Akuvox Company","product":"Akuvox Smart Intercom","versions":[{"version":"R20K-2","status":"affected"},{"version":"R20A-2","status":"affected"},{"version":"C313W-2","status":"affected"},{"version":"NS-2","status":"affected"},{"version":"NC-2","status":"affected"},{"version":"NX-2","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5862.php","name":"Zero Science Lab Disclosure (ZSL-2024-5862)","tags":["third-party-advisory"]},{"url":"https://packetstormsecurity.com/files/182870/","name":"Packet Storm Security Exploit Entry","tags":["exploit"]},{"url":"https://cxsecurity.com/issue/WLB-2024110042","name":"CXSecurity Vulnerability Listing","tags":["third-party-advisory"]},{"name":"VulnCheck Advisory: Akuvox Smart Intercom S539 Improper Access Control via ServicesHTTPAPI","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/akuvox-smart-intercom-s-improper-access-control-via-serviceshttpapi"}],"credits":[{"lang":"en","value":"LiquidWorm as Gjoko Krstic of Zero Science Lab","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"references":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5862.php","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-02T14:24:35.516682Z","id":"CVE-2024-58337","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-02T14:38:57.652Z"}}]}}