CVE-2024-54012
Command Injection Vulnerability in Camera System Allows Remote Code Execution
Publication date: 2026-04-28
Last updated on: 2026-04-28
Assigner: Hanwha Vision Co., Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability was discovered by penetration testing engineers at Amazon in a camera system. The issue arises because the camera system does not properly validate input, which allows specially crafted requests containing malicious commands to be executed on the device.
The manufacturer has released patch firmware to address this flaw.
How can this vulnerability impact me? :
Because the vulnerability allows execution of malicious commands on the camera device, an attacker could potentially take control of the device, leading to unauthorized access or manipulation of the camera system.
This could result in privacy breaches, unauthorized surveillance, or disruption of the device's normal operation.
What immediate steps should I take to mitigate this vulnerability?
The manufacturer has released patch firmware for the flaw. Applying the manufacturer's patch firmware is the recommended immediate step to mitigate this vulnerability.
Please refer to the manufacturer's report for additional details and possible workarounds.