CVE-2024-48760

An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:gestioip:gestioip:3.5.7:*:*:*:*:*:*:*

History

06 Jun 2025, 15:40

Type Values Removed Values Added
References () https://github.com/muebel/gestioip-docker-compose - () https://github.com/muebel/gestioip-docker-compose - Product
References () https://github.com/maxibelino/CVEs/tree/main/CVE-2024-48760 - () https://github.com/maxibelino/CVEs/tree/main/CVE-2024-48760 - Exploit, Third Party Advisory
References () http://www.gestioip.net/index.html - () http://www.gestioip.net/index.html - Product
First Time Gestioip gestioip
Gestioip
CPE cpe:2.3:a:gestioip:gestioip:3.5.7:*:*:*:*:*:*:*

15 Jan 2025, 00:15

Type Values Removed Values Added
Summary An issue in GestiolP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution. An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.

14 Jan 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-14 22:15

Updated : 2025-06-06 15:40


NVD link : CVE-2024-48760

Mitre link : CVE-2024-48760


JSON object : View

Products Affected

gestioip

  • gestioip
CWE

No CWE.