KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
History

Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-15T19:40:16.829Z

Reserved: 2024-01-21T00:00:00.000Z

Link: CVE-2024-23749

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:07.434Z

cve-icon NVD

Status : Modified

Published: 2024-02-09T08:15:08.530

Modified: 2025-05-15T20:15:44.290

Link: CVE-2024-23749

cve-icon Redhat

No data.