A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. The manipulation of the argument uuid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257198 is the identifier assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-pwd_update.php.pdf | Broken Link |
| https://vuldb.com/?ctiid.257198 | Permissions Required |
| https://vuldb.com/?id.257198 | Third Party Advisory |
| https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-pwd_update.php.pdf | Broken Link |
| https://vuldb.com/?ctiid.257198 | Permissions Required |
| https://vuldb.com/?id.257198 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-03-19 01:15
Updated : 2025-02-27 14:25
NVD link : CVE-2024-2621
Mitre link : CVE-2024-2621
CVE.ORG link : CVE-2024-2621
JSON object : View
Products Affected
kelixin_communication_command_and_dispatch_project
- kelixin_communication_command_and_dispatch
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
