Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7218 | In Zucchetti Ad Hoc Infinity 2.4, an improper check on the m_cURL parameter allows an attacker to redirect the victim to an attacker-controlled website after the authentication. |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 28 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zucchetti
Zucchetti ad Hoc Infinity |
|
| CPEs | cpe:2.3:a:zucchetti:ad_hoc_infinity:2.4:*:*:*:*:*:*:* | |
| Vendors & Products |
Zucchetti
Zucchetti ad Hoc Infinity |
Fri, 21 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-601 | |
| Metrics |
cvssV3_1
|
Tue, 11 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Zucchetti Ad Hoc Infinity 2.4, an improper check on the m_cURL parameter allows an attacker to redirect the victim to an attacker-controlled website after the authentication. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-21T20:47:01.303Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-51321
Updated: 2025-03-21T20:46:55.249Z
Status : Analyzed
Published: 2025-03-11T15:15:42.570
Modified: 2025-05-28T14:48:50.617
Link: CVE-2024-51321
No data.
OpenCVE Enrichment
No data.
EUVD