Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37570: n/a

0
High
VulnerabilityCVE-2024-37570cvecve-2024-37570
Published: Sun Jun 09 2024 (06/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

On Mitel 6869i 4.5.0.41 devices, the Manual Firmware Update (upgrade.html) page does not perform sanitization on the username and path parameters (sent by an authenticated user) before appending flags to the busybox ftpget command. This leads to $() command execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:40:07 UTC

Technical Analysis

CVE-2024-37570 is a command injection vulnerability identified in the Mitel 6869i IP phone firmware version 4.5.0.41. The vulnerability arises from insufficient input sanitization on the Manual Firmware Update web interface, specifically the username and path parameters submitted by authenticated users. These parameters are directly appended to a busybox ftpget command without proper escaping or validation, allowing an attacker to inject shell commands using the $() syntax. This leads to arbitrary command execution on the device, which can compromise the device’s operating system and potentially the broader network environment. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only privileges of an authenticated user. No public patches or exploits have been reported yet, but the risk is significant given the device’s role in enterprise telephony infrastructure.

Potential Impact

Exploitation of this vulnerability allows an authenticated attacker to execute arbitrary commands on the Mitel 6869i device, potentially leading to full compromise of the device. This can result in unauthorized access to sensitive communications, disruption of telephony services, and pivoting to other internal systems. The impact extends to confidentiality breaches through interception or manipulation of voice data, integrity violations by altering device firmware or configuration, and availability issues by causing device crashes or denial of service. Given the device’s integration in enterprise voice networks, successful exploitation could disrupt critical business communications and expose organizations to espionage or sabotage.

Mitigation Recommendations

Organizations should immediately verify if they are using Mitel 6869i devices with firmware version 4.5.0.41 and restrict access to the Manual Firmware Update interface to trusted administrators only. Network segmentation should isolate these devices from untrusted networks to reduce exposure. Employ strict access controls and multi-factor authentication for device management interfaces. Monitor device logs for unusual command execution or firmware update activities. Since no official patch is currently available, consider disabling the Manual Firmware Update web page if feasible or applying web application firewall (WAF) rules to detect and block command injection patterns in the username and path parameters. Engage with Mitel support for updates or mitigations and plan for timely firmware upgrades once patches are released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c68b7ef31ef0b563b79

Added to database: 2/25/2026, 9:40:56 PM

Last enriched: 2/28/2026, 3:40:07 AM

Last updated: 4/12/2026, 12:45:50 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses