CVE-2024-10121

HIGH

wfh45678 Radar <1.0.8 - Auth Bypass

Title source: llm
STIX 2.1

Description

A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way.

References (4)

Core 4
Core References
Permissions Required vdb-entry technical-description
https://vuldb.com/?id.280913
Permissions Required signature permissions-required
https://vuldb.com/?ctiid.280913
Third Party Advisory third-party-advisory
https://vuldb.com/?submit.420960

Scores

CVSS v3 7.3
EPSS 0.0022
EPSS Percentile 44.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-639
Status published
Products (1)
riskengine/radar < 1.0.8
Published Oct 18, 2024
Tracked Since Feb 18, 2026