Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 05 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Easywall Project
Easywall Project easywall |
|
| Vendors & Products |
Easywall Project
Easywall Project easywall |
Thu, 04 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server. | |
| Title | Easywall 0.3.1 - Authentication Bypass via Command Injection in /ports-save Endpoint | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:08:29.158Z
Reserved: 2025-12-04T16:01:43.113Z
Link: CVE-2024-58275
Updated: 2025-12-05T16:46:22.615Z
Status : Deferred
Published: 2025-12-04T21:16:07.360
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-58275
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:52:15Z