Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/N1nEmAn/wp/blob/main/m0tOrol%40-Cx2l.pdf |
|
Tue, 08 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Motorola
Motorola cx2l Firmware |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:o:motorola:cx2l_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Motorola
Motorola cx2l Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 08 Oct 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-08T15:27:13.517Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-45880
Updated: 2024-10-08T15:26:59.405Z
Status : Deferred
Published: 2024-10-08T15:15:15.217
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-45880
No data.
OpenCVE Enrichment
No data.