CVE-2024-54780

Netgate pfSense CE (prior to 2.8.0 beta release) and corresponding Plus builds are vulnerable to command injection in the OpenVPN widget due to improper sanitization of user-supplied input to the OpenVPN management interface. An authenticated attacker can exploit this vulnerability by injecting arbitrary OpenVPN management commands via the remipp parameter.
Configurations

No configuration.

History

17 May 2025, 13:15

Type Values Removed Values Added
References
  • {'url': 'http://netgate.com', 'source': 'cve@mitre.org'}
  • () https://www.netgate.com/blog/important-security-updates-for-pfsense-plus-24.11-and-ce-2.7.2 -

16 May 2025, 14:43

Type Values Removed Values Added
Summary
  • (es) Netgate pfSense CE (anterior a la versión beta 2.8.0) y sus compilaciones Plus correspondientes son vulnerables a la inyección de comandos en el widget OpenVPN debido a una limpieza incorrecta de la entrada proporcionada por el usuario a la interfaz de administración de OpenVPN. Un atacante autenticado puede explotar esta vulnerabilidad inyectando comandos arbitrarios de administración de OpenVPN mediante el parámetro remipp.

14 May 2025, 15:15

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

14 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-14 14:15

Updated : 2025-05-17 13:15


NVD link : CVE-2024-54780

Mitre link : CVE-2024-54780

CVE.ORG link : CVE-2024-54780


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')