{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:11:15.566","vulnerabilities":[{"cve":{"id":"CVE-2024-7728","sourceIdentifier":"twcert@cert.org.tw","published":"2024-08-14T04:15:06.757","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The specific CGI of the CAYIN Technology CMS does not properly validate user input, allowing a remote attacker with administrator privileges to inject OS commands into the specific parameter and execute them on the remote server."},{"lang":"es","value":"El CGI específico del CMS de CAYIN Technology no valida adecuadamente la entrada del usuario, lo que permite a un atacante remoto con privilegios de administrador inyectar comandos del sistema operativo en el parámetro específico y ejecutarlos en el servidor remoto."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://resource1.cayintech.com/patch/","source":"twcert@cert.org.tw"},{"url":"https://www.twcert.org.tw/en/cp-139-8002-b6167-2.html","source":"twcert@cert.org.tw"},{"url":"https://www.twcert.org.tw/tw/cp-132-8001-8416d-1.html","source":"twcert@cert.org.tw"}]}}]}