{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T10:15:36.325","vulnerabilities":[{"cve":{"id":"CVE-2025-24938","sourceIdentifier":"b48c3b8f-639e-4c16-8725-497bc411dad0","published":"2025-07-21T07:15:24.130","lastModified":"2025-08-11T14:52:40.313","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver.\n\nThe vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management."},{"lang":"es","value":"La aplicación web permite que la entrada del usuario se transfiera sin filtrar a un comando que se ejecuta en el sistema operativo subyacente. Un atacante con privilegios elevados (administrador) a la aplicación podría ejecutar comandos en el sistema operativo en el contexto del servidor web. El componente vulnerable está vinculado a la pila de red y el conjunto de posibles atacantes se extiende a toda Internet. Tiene el potencial de inyectar comandos al crear un nuevo usuario desde la Administración de Usuarios."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nokia:wavesuite_noc:23.6:*:*:*:*:*:*:*","matchCriteriaId":"557A2709-02CD-41F2-8D39-591C55DBC6CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:nokia:wavesuite_noc:23.12:*:*:*:*:*:*:*","matchCriteriaId":"3A4BF10D-5F41-49B7-AF3F-BAC85C6D8A15"},{"vulnerable":true,"criteria":"cpe:2.3:a:nokia:wavesuite_noc:24.6:-:*:*:*:*:*:*","matchCriteriaId":"9CA0E502-BCDA-4616-A4D2-0DBBC22163DA"}]}]}],"references":[{"url":"https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24938/","source":"b48c3b8f-639e-4c16-8725-497bc411dad0","tags":["Vendor Advisory"]}]}}]}