CVE-2024-24731

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the http_download command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

cpe:2.3:o:silabs:gecko_os:*:*:*:*:*:*:*:*

History

07 Jul 2025, 13:46

Type Values Removed Values Added
First Time Silabs
Silabs gecko Os
CWE CWE-120
CPE cpe:2.3:o:silabs:gecko_os:*:*:*:*:*:*:*:*
References () https://community.silabs.com/a45Vm0000000Atp - () https://community.silabs.com/a45Vm0000000Atp - Permissions Required
References () https://www.zerodayinitiative.com/advisories/ZDI-24-870/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-870/ - Third Party Advisory

30 Jun 2025, 18:15

Type Values Removed Values Added
CWE CWE-120

31 Jan 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-31 00:15

Updated : 2025-07-07 13:46


NVD link : CVE-2024-24731

Mitre link : CVE-2024-24731


JSON object : View

Products Affected

silabs

  • gecko_os
CWE

No CWE.