Anevia Flamingo XL 3.2.9 contains a restricted shell vulnerability that allows remote attackers to escape the sandboxed environment through the traceroute command. Attackers can exploit the traceroute command to inject shell commands and gain full root access to the device by bypassing the restricted login environment.
References
| Link | Resource |
|---|---|
| https://www.ateme.com | Product |
| https://www.exploit-db.com/exploits/51516 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/anevia-flamingo-xl-remote-root-jailbreak-via-traceroute-command | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5780.php | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5780.php | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-30 23:15
Updated : 2026-01-16 19:16
NVD link : CVE-2024-58338
Mitre link : CVE-2024-58338
CVE.ORG link : CVE-2024-58338
JSON object : View
Products Affected
ateme
- flamingo_xl_firmware
- flamingo_xl
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
