A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech eki-6333ac-1gpo Advantech eki-6333ac-1gpo Firmware Advantech eki-6333ac-2g Advantech eki-6333ac-2g Firmware Advantech eki-6333ac-2gd Advantech eki-6333ac-2gd Firmware |
|
| CPEs | cpe:2.3:h:advantech:eki-6333ac-1gpo:-:*:*:*:*:*:*:* cpe:2.3:h:advantech:eki-6333ac-2g:-:*:*:*:*:*:*:* cpe:2.3:h:advantech:eki-6333ac-2gd:-:*:*:*:*:*:*:* cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Advantech
Advantech eki-6333ac-1gpo Advantech eki-6333ac-1gpo Firmware Advantech eki-6333ac-2g Advantech eki-6333ac-2g Firmware Advantech eki-6333ac-2gd Advantech eki-6333ac-2gd Firmware |
Tue, 26 Nov 2024 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-11-26T14:19:26.395Z
Reserved: 2024-10-23T07:55:58.311Z
Link: CVE-2024-50370
No data.
Status : Analyzed
Published: 2024-11-26T11:22:05.563
Modified: 2026-01-23T18:13:51.613
Link: CVE-2024-50370
No data.