{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T21:04:37.729","vulnerabilities":[{"cve":{"id":"CVE-2024-41153","sourceIdentifier":"cybersecurity@hitachienergy.com","published":"2024-10-29T13:15:04.600","lastModified":"2025-10-24T09:15:39.647","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Command injection vulnerability in the Edge Computing UI for the\nTRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an attacker with write access to the\nweb UI can execute commands on the device with root privileges,\nfar more extensive than what the write privilege intends."},{"lang":"es","value":"Vulnerabilidad de inyección de comandos en la interfaz de usuario de Edge Computing para las radios de la serie TRO600 que permite la ejecución de comandos arbitrarios del sistema. Si se explota, un atacante con acceso de escritura a la interfaz de usuario web puede ejecutar comandos en el dispositivo con privilegios de root, mucho más amplios que los que pretende el privilegio de escritura."}],"metrics":{"cvssMetricV31":[{"source":"cybersecurity@hitachienergy.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"cybersecurity@hitachienergy.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0.0","versionEndExcluding":"9.2.0.5","matchCriteriaId":"D5C2D2E0-5383-44E5-B8C6-C743503A8E51"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*","matchCriteriaId":"B3A46C6E-9314-40EB-A8BE-0D3A26B5FE4C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0.0","versionEndExcluding":"9.2.0.5","matchCriteriaId":"4BE01813-8087-4E9B-8B2B-FF813C0E9506"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*","matchCriteriaId":"DC979E74-6316-4BED-87A6-4DC9B9747E0F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0.0","versionEndExcluding":"9.2.0.5","matchCriteriaId":"A6A94F87-2875-46C9-8BD3-BE3EA9F71648"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*","matchCriteriaId":"E84F6910-1D58-4AE7-94EF-797C9BD52690"}]}]}],"references":[{"url":"https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch","source":"cybersecurity@hitachienergy.com","tags":["Vendor Advisory"]}]}}]}