CVE-2024-28138
HIGHUnknown - Command Injection
Title source: llmDescription
An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.
Exploits (1)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Scan2Net_CVE-2024-28138_RCE.py
Scores
CVSS v3
7.3
EPSS
0.0076
EPSS Percentile
73.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Details
CWE
CWE-78
Status
published
Products (1)
Image Access GmbH/Scan2Net
< 7.40
Published
Dec 10, 2024
Tracked Since
Feb 18, 2026