Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52778: n/a

0
Critical
VulnerabilityCVE-2024-52778cvecve-2024-52778
Published: Fri Nov 29 2024 (11/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

DCME-320 <=7.4.12.90, DCME-520 <=9.25.5.11, DCME-320-L <=9.3.5.26, and DCME-720 <=9.1.5.11 are vulnerable to Remote Code Execution via /function/audit/newstatistics/mon_stat_hist.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:06:29 UTC

Technical Analysis

CVE-2024-52778 is a critical remote code execution (RCE) vulnerability identified in several versions of DCME products: DCME-320 versions up to 7.4.12.90, DCME-520 up to 9.25.5.11, DCME-320-L up to 9.3.5.26, and DCME-720 up to 9.1.5.11. The vulnerability resides in the /function/audit/newstatistics/mon_stat_hist.php endpoint, which is accessible over the network. An attacker can exploit this flaw without any authentication or user interaction, allowing them to execute arbitrary code on the affected server remotely. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, highlighting its high impact on confidentiality, integrity, and availability. The vulnerability's exploitation vector is network-based with low attack complexity and no privileges required, making it highly exploitable. Although no public exploits or active exploitation have been reported yet, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. The lack of patch links suggests that fixes may be pending or not yet publicly released, increasing the urgency for organizations to monitor vendor advisories and apply updates promptly once available.

Potential Impact

The potential impact of CVE-2024-52778 is severe and wide-ranging. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise. This can result in unauthorized data access, data manipulation, service disruption, and the deployment of malware or ransomware. Given the critical nature of the affected DCME products, which may be used in enterprise or industrial environments, the vulnerability could disrupt business operations, compromise sensitive information, and damage organizational reputation. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and wormable scenarios. Organizations relying on these DCME versions face significant risk until the vulnerability is mitigated, especially those in sectors where uptime and data integrity are paramount, such as finance, healthcare, manufacturing, and critical infrastructure.

Mitigation Recommendations

Organizations should immediately identify and inventory all affected DCME products and versions within their environment. Since no patch links are currently provided, it is critical to monitor vendor communications for official patches or updates addressing CVE-2024-52778. In the interim, restrict network access to the vulnerable endpoint (/function/audit/newstatistics/mon_stat_hist.php) using firewalls or web application firewalls (WAFs) to block unauthorized requests. Implement network segmentation to isolate vulnerable systems from untrusted networks. Enable and enhance logging and monitoring to detect any suspicious activity targeting the vulnerable endpoint. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures once available. Conduct regular vulnerability scans to ensure no systems remain unpatched or exposed. Prepare incident response plans tailored to potential exploitation scenarios. Finally, consider deploying application-layer mitigations such as input validation or disabling the vulnerable functionality if feasible until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb8b7ef31ef0b55a5e9

Added to database: 2/25/2026, 9:38:00 PM

Last enriched: 2/28/2026, 3:06:29 AM

Last updated: 4/12/2026, 7:43:39 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses