#VU107455 OS Command Injection in SENTRON 7KT PAC1260 Data Manager - CVE-2024-41789

 

#VU107455 OS Command Injection in SENTRON 7KT PAC1260 Data Manager - CVE-2024-41789

Published: April 15, 2025


Vulnerability identifier: #VU107455
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-41789
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
SENTRON 7KT PAC1260 Data Manager
Software vendor:
Siemens

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation within the language parameter in specific POST requests. A remote administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links