CVE-2024-44414: n/a
A vulnerability was discovered in FBM_292W-21.03.10V, which has been classified as critical. This issue affects the sub_4901E0 function in the msp_info.htm file. Manipulation of the path parameter can lead to command injection.
AI Analysis
Technical Summary
CVE-2024-44414 is a critical security vulnerability identified in the FBM_292W-21.03.10V firmware/software version. The vulnerability exists in the sub_4901E0 function within the msp_info.htm file, where improper sanitization of the 'path' parameter allows for command injection attacks. This means an attacker can manipulate the 'path' parameter to inject and execute arbitrary system commands on the affected device remotely. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) without any user interaction (UI:N). The scope is unchanged (S:U), but the impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H). The underlying weakness corresponds to CWE-94: Improper Control of Generation of Code ('Code Injection'). No patches or fixes have been linked yet, and no known exploits are reported in the wild as of the publication date. Given the nature of the vulnerability, successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary commands, potentially leading to data theft, service disruption, or lateral movement within a network.
Potential Impact
The impact of CVE-2024-44414 is significant for organizations using the affected FBM_292W-21.03.10V software. Exploitation can result in complete system compromise, including unauthorized access to sensitive data, disruption of services, and potential use of the compromised device as a foothold for further attacks within an enterprise network. The vulnerability affects confidentiality, integrity, and availability, making it a critical risk. Organizations relying on this software for network infrastructure or critical operations face potential operational downtime, reputational damage, and regulatory consequences if exploited. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent attention.
Mitigation Recommendations
1. Immediately restrict network access to the vulnerable msp_info.htm interface by implementing firewall rules or network segmentation to limit exposure. 2. Employ strict input validation and sanitization on the 'path' parameter if custom modifications or patches are possible. 3. Monitor logs and network traffic for unusual command execution patterns or unexpected parameter values targeting the vulnerable function. 4. Engage with the vendor or software maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 5. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block command injection attempts targeting this specific parameter. 6. Conduct thorough security assessments and penetration testing on systems running the affected software to identify potential exploitation. 7. Educate system administrators and security teams about this vulnerability to ensure rapid detection and response.
Affected Countries
United States, China, Germany, Japan, South Korea, India, United Kingdom, France, Canada, Australia
CVE-2024-44414: n/a
Description
A vulnerability was discovered in FBM_292W-21.03.10V, which has been classified as critical. This issue affects the sub_4901E0 function in the msp_info.htm file. Manipulation of the path parameter can lead to command injection.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44414 is a critical security vulnerability identified in the FBM_292W-21.03.10V firmware/software version. The vulnerability exists in the sub_4901E0 function within the msp_info.htm file, where improper sanitization of the 'path' parameter allows for command injection attacks. This means an attacker can manipulate the 'path' parameter to inject and execute arbitrary system commands on the affected device remotely. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L) without any user interaction (UI:N). The scope is unchanged (S:U), but the impact is severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H). The underlying weakness corresponds to CWE-94: Improper Control of Generation of Code ('Code Injection'). No patches or fixes have been linked yet, and no known exploits are reported in the wild as of the publication date. Given the nature of the vulnerability, successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary commands, potentially leading to data theft, service disruption, or lateral movement within a network.
Potential Impact
The impact of CVE-2024-44414 is significant for organizations using the affected FBM_292W-21.03.10V software. Exploitation can result in complete system compromise, including unauthorized access to sensitive data, disruption of services, and potential use of the compromised device as a foothold for further attacks within an enterprise network. The vulnerability affects confidentiality, integrity, and availability, making it a critical risk. Organizations relying on this software for network infrastructure or critical operations face potential operational downtime, reputational damage, and regulatory consequences if exploited. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent attention.
Mitigation Recommendations
1. Immediately restrict network access to the vulnerable msp_info.htm interface by implementing firewall rules or network segmentation to limit exposure. 2. Employ strict input validation and sanitization on the 'path' parameter if custom modifications or patches are possible. 3. Monitor logs and network traffic for unusual command execution patterns or unexpected parameter values targeting the vulnerable function. 4. Engage with the vendor or software maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 5. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block command injection attempts targeting this specific parameter. 6. Conduct thorough security assessments and penetration testing on systems running the affected software to identify potential exploitation. 7. Educate system administrators and security teams about this vulnerability to ensure rapid detection and response.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cdeb7ef31ef0b569ac6
Added to database: 2/25/2026, 9:42:54 PM
Last enriched: 2/26/2026, 7:52:56 AM
Last updated: 4/12/2026, 9:25:56 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.