CVE-2024-54012
Received Received - Intake
Command Injection Vulnerability in Camera System Allows Remote Code Execution

Publication date: 2026-04-28

Last updated on: 2026-04-28

Assigner: Hanwha Vision Co., Ltd.

Description
Penetration Testing engineers at Amazon discovered a vulnerability where the camera system failed to properly validate input, allowing specially crafted requests containing malicious commands to be executed on the device. The manufacturer has released patch firmware for the flaw; please refer to the manufacturer's report for details and workarounds.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability was discovered by penetration testing engineers at Amazon in a camera system. The issue arises because the camera system does not properly validate input, which allows specially crafted requests containing malicious commands to be executed on the device.

The manufacturer has released patch firmware to address this flaw.


How can this vulnerability impact me? :

Because the vulnerability allows execution of malicious commands on the camera device, an attacker could potentially take control of the device, leading to unauthorized access or manipulation of the camera system.

This could result in privacy breaches, unauthorized surveillance, or disruption of the device's normal operation.


What immediate steps should I take to mitigate this vulnerability?

The manufacturer has released patch firmware for the flaw. Applying the manufacturer's patch firmware is the recommended immediate step to mitigate this vulnerability.

Please refer to the manufacturer's report for additional details and possible workarounds.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart