Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1122-cdrt-5ugn
SummaryA CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands.
Aliases
0
alias CVE-2024-50359
Fixed_packages
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-50359
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35681
published_at 2026-04-13T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35748
published_at 2026-04-11T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35704
published_at 2026-04-12T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35764
published_at 2026-04-02T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.3579
published_at 2026-04-04T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.3567
published_at 2026-04-07T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35716
published_at 2026-04-08T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35739
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-50359
1
reference_url https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50359
reference_id vulnerability-advisories-cve-2024-50359
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-26T14:12:07Z/
url https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50359
Weaknesses
0
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Exploits
Severity_range_score7.2 - 7.2
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1122-cdrt-5ugn