An issue in VitalPBX v.3.2.4-5 allows an attacker to execute arbitrary code via a crafted payload to the /var/lib/vitalpbx/scripts folder.
References
| Link | Resource |
|---|---|
| https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4 | Exploit Third Party Advisory |
| https://github.com/erick-duarte/CVE-2024-24386 | Exploit Third Party Advisory |
| https://erickduarte.notion.site/VitalPBX-3-2-4-5-ee402173241c493687aa22ec60160c67?pvs=4 | Exploit Third Party Advisory |
| https://github.com/erick-duarte/CVE-2024-24386 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-15 08:15
Updated : 2025-09-18 16:22
NVD link : CVE-2024-24386
Mitre link : CVE-2024-24386
CVE.ORG link : CVE-2024-24386
JSON object : View
Products Affected
vitalpbx
- vitalpbx
CWE
CWE-284
Improper Access Control
