{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T04:42:21.452","vulnerabilities":[{"cve":{"id":"CVE-2024-39351","sourceIdentifier":"security@synology.com","published":"2024-06-28T06:15:05.887","lastModified":"2025-04-10T18:38:11.963","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability regarding improper neutralization of special elements used in an OS command ('OS Command Injection') is found in the NTP configuration. This allows remote authenticated users with administrator privileges to execute arbitrary commands via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500."},{"lang":"es","value":"En la configuración NTP se encuentra una vulnerabilidad relacionada con la neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('Inyección de comando del sistema operativo'). Esto permite a usuarios remotos autenticados con privilegios de administrador ejecutar comandos arbitrarios a través de vectores no especificados. Los siguientes modelos con versiones de firmware de cámara Synology anteriores a 1.0.7-0298 pueden verse afectados: BC500 y TC500."}],"metrics":{"cvssMetricV31":[{"source":"security@synology.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@synology.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:synology:bc500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.7-0298","matchCriteriaId":"11106950-DFD0-441A-8DE3-DA19C15281B1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:synology:bc500:-:*:*:*:*:*:*:*","matchCriteriaId":"5FD618BD-29BD-4F43-9BEF-F73065247580"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:synology:tc500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.7-0298","matchCriteriaId":"F4DBB838-E652-4C96-AC50-AF07510EF8E5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:synology:tc500:-:*:*:*:*:*:*:*","matchCriteriaId":"582C2C89-3351-4DC6-B40A-7E2E4CA6AFEA"}]}]}],"references":[{"url":"https://www.synology.com/en-global/security/advisory/Synology_SA_23_15","source":"security@synology.com","tags":["Vendor Advisory"]},{"url":"https://www.synology.com/en-global/security/advisory/Synology_SA_23_15","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}