{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T23:02:18.715","vulnerabilities":[{"cve":{"id":"CVE-2024-45880","sourceIdentifier":"cve@mitre.org","published":"2024-10-08T15:15:15.217","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos en el enrutador Motorola CX2L v1.0.2 y versiones anteriores. La vulnerabilidad está presente en la función SetStationSettings. El sistema invoca directamente la función del sistema para ejecutar comandos para configurar parámetros como la dirección MAC sin el filtrado de entrada adecuado. Esto permite que los usuarios malintencionados inyecten y ejecuten comandos arbitrarios."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://github.com/N1nEmAn/wp/blob/main/m0tOrol%40-Cx2l.pdf","source":"cve@mitre.org"}]}}]}