A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-45068 | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation. |
Fixes
Solution
Update affected products to the following firmware versions released by Advantech: - EKI-6333AC-2G: v1.6.5 - EKI-6333AC-2GD: v1.6.5 - EKI-6333AC-1GPO: v1.2.2
Workaround
No workaround given by the vendor.
References
History
Sat, 24 Jan 2026 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech eki-6333ac-1gpo Advantech eki-6333ac-1gpo Firmware Advantech eki-6333ac-2g Advantech eki-6333ac-2g Firmware Advantech eki-6333ac-2gd Advantech eki-6333ac-2gd Firmware |
|
| CPEs | cpe:2.3:h:advantech:eki-6333ac-1gpo:-:*:*:*:*:*:*:* cpe:2.3:h:advantech:eki-6333ac-2g:-:*:*:*:*:*:*:* cpe:2.3:h:advantech:eki-6333ac-2gd:-:*:*:*:*:*:*:* cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Advantech
Advantech eki-6333ac-1gpo Advantech eki-6333ac-1gpo Firmware Advantech eki-6333ac-2g Advantech eki-6333ac-2g Firmware Advantech eki-6333ac-2gd Advantech eki-6333ac-2gd Firmware |
Tue, 26 Nov 2024 20:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-11-26T14:19:26.395Z
Reserved: 2024-10-23T07:55:58.311Z
Link: CVE-2024-50370
No data.
Status : Analyzed
Published: 2024-11-26T11:22:05.563
Modified: 2026-01-23T18:13:51.613
Link: CVE-2024-50370
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD