Vulnerability Description
A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240313. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file api/client/get_extension_yl.php. The manipulation of the argument imei leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257065 was assigned to this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kelixin Communication Command And Dispatch Project | Kelixin Communication Command And Dispatch | <= 2024-03-13 |
Related Weaknesses (CWE)
References
- https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%2Broken Link
- https://vuldb.com/?ctiid.257065Permissions RequiredVDB Entry
- https://vuldb.com/?id.257065Third Party AdvisoryVDB Entry
- https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%2Broken Link
- https://vuldb.com/?ctiid.257065Permissions RequiredVDB Entry
- https://vuldb.com/?id.257065Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-2566?
CVE-2024-2566 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240313. It has been declared as critical. Affected by this vulnerability is an unknown functionality of ...
How severe is CVE-2024-2566?
CVE-2024-2566 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2566?
Check the references section above for vendor advisories and patch information. Affected products include: Kelixin Communication Command And Dispatch Project Kelixin Communication Command And Dispatch.