Arbitrary Command Execution Vulnerability in GoCast 1.1.3 via OS Command Injection
CVE-2024-28892

9.8CRITICAL

Key Information:

Vendor

Gocast

Status
Vendor
CVE Published:
21 November 2024

What is CVE-2024-28892?

A vulnerability resides within the GoCast product, specifically in version 1.1.3, that allows for OS command injection through the manipulation of the name parameter. Attackers can exploit this weakness by sending specially crafted HTTP requests, leading to the potential for arbitrary command execution on the affected system. This vulnerability does not require authentication, significantly increasing the risk of exploitation. Organizations using GoCast should prioritize assessing their systems for this vulnerability to mitigate potential security threats.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

GoCast 1.1.3

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by Matt Street and Edwin Molenaar of Cisco Meraki.
.