CVE-2024-33792

netis-systems MEX605 v2.00.06 allows attackers to execute arbitrary OS commands via a crafted payload to the tracert page.
References
Link Resource
https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 Exploit Third Party Advisory
https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*
cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*

History

17 Jun 2025, 15:10

Type Values Removed Values Added
References () https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 - () https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792 - Exploit, Third Party Advisory
First Time Netis-systems
Netis-systems mex605 Firmware
Netis-systems mex605
CPE cpe:2.3:h:netis-systems:mex605:-:*:*:*:*:*:*:*
cpe:2.3:o:netis-systems:mex605_firmware:2.00.06:*:*:*:*:*:*:*
CWE CWE-78

Information

Published : 2024-05-03 17:15

Updated : 2025-06-17 15:10


NVD link : CVE-2024-33792

Mitre link : CVE-2024-33792

CVE.ORG link : CVE-2024-33792


JSON object : View

Products Affected

netis-systems

  • mex605
  • mex605_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-20

Improper Input Validation