[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":3,"vulnerability-23089":10,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":42,"all-banners":48,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":149},["Island",4],{"key":5,"params":6,"result":8},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":7},"{}",{"head":9},{},{"id":11,"detectable_with":12,"vuln_details":19,"vuln_id":39,"name":40,"published":41,"updated":20},23089,{"tool":13,"engine":16},{"id":14,"name":15},1,"Network Scanner",{"id":17,"name":18},2,"Nuclei",{"id":11,"codename":20,"description":20,"severity":21,"risk_description":22,"public_description":23,"public_recommendation":24,"recommendation":20,"references":25,"cvssv3":32,"epss_score":33,"epss_percentile":34,"cve":35,"in_cisa_catalog":37,"date":38,"software_type":20,"vendor":20,"product":20,"ptt_exploit_capabilities":20},null,"high","The risk exists that a remote unauthenticated attacker can fully compromise the server to steal confidential information, install ransomware, or pivot to the internal network.","The endpoint `/cgi-bin/supervisor/Factory.cgi` is vulnerable to command injection via the `action` parameter, allowing remote code execution.","Apply security patches from AVTECH or implement network segmentation and access controls to restrict access to the vulnerable endpoint.",[26,27,28,29,30,31],"https://www.akamai.com/blog/security-research/2024-corona-mirai-botnet-infects-zero-day-sirt","https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-07","https://github.com/fkie-cad/nvd-json-data-feeds","https://github.com/nomi-sec/PoC-in-GitHub","https://github.com/Ostorlab/KEV","https://github.com/bigherocenter/CVE-2024-7029-EXPLOIT/blob/main/CVE-2024-7029.py",8.8,0.92942,0.99777,[36],"CVE-2024-7029",false,"2024-08-02T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2024-7029","AVTECH IP Camera - Command Injection","2024-09-06T00:00:00Z",["Island",43],{"key":44,"params":45,"result":46},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":7},{"head":47},{},[49,60,69,76,83,90,97,104,111,116,122,127,133,138,143],{"title":50,"slug":51,"text":52,"link":53,"external":54,"targets":55,"cta":57,"variant":58,"campaign_id":59},"Yearly plan offer (save 2 months) - Homepage","yearly-2months-homepage","Fix your 2026 tooling cost. Save 2 months upfront.","/pricing",true,[56],"/","Check yearly plans","secondary","yearly-2months",{"title":61,"slug":62,"text":63,"link":64,"external":37,"targets":65,"cta":67,"variant":68,"campaign_id":20},"Compliance - Advanced Pentest Reporting","compliance-advanced-pentest-reporting","Prove your compliance. Get built-in validation with audit-ready reports.","https://pentest-tools.com/pricing",[66],"/features/advanced-pentest-reporting","Unlock audit-ready reports","primary",{"title":70,"slug":71,"text":72,"link":64,"external":37,"targets":73,"cta":75,"variant":68,"campaign_id":20},"Compliance - Integrations","compliance-integrations","Disconnected tools hide compliance breaches. Stay audit-ready 24/7 with the right integrations.",[74],"/features/integrations","Automate your compliance",{"title":77,"slug":78,"text":79,"link":64,"external":37,"targets":80,"cta":82,"variant":68,"campaign_id":20},"Compliance - ML Classifier","compliance-ml-classifier","Put compliance on Auto this year with 50% fewer FPs. Go deeper with the WebNetSec plan.",[81],"/features/machine-learning-classifier","Explore WebNetSec",{"title":84,"slug":85,"text":86,"link":64,"external":37,"targets":87,"cta":89,"variant":68,"campaign_id":20},"Compliance - Pentest Robots","compliance-pentest-robots","Put compliance on Auto with Pentest Robots. Available with any plan.",[88],"/features/pentest-robots","Automate continuous scans",{"title":91,"slug":92,"text":93,"link":64,"external":37,"targets":94,"cta":96,"variant":68,"campaign_id":20},"Compliance - Sniper: Auto-Exploiter","compliance-sniper-auto-exploiter","Get audit-ready proof and put compliance on Auto with our proprietary Sniper: Auto-exploiter. Available with Pentest Suite.",[95],"/exploit-helpers/sniper","Get proof with Pentest Suite",{"title":98,"slug":99,"text":100,"link":64,"external":37,"targets":101,"cta":103,"variant":68,"campaign_id":20},"Compliance - Network Scanner","compliance-network-scanner","Map your attack surface and prove infrastructure compliance with the Network Scanner. Available with any plan.",[102],"/network-vulnerability-scanning/network-security-scanner-online","Upgrade your plan",{"title":105,"slug":106,"text":107,"link":64,"external":37,"targets":108,"cta":110,"variant":68,"campaign_id":20},"Compliance - Website Scanner","compliance-website-scanner","Prove real risk instantly and put compliance on Auto with the Website Scanner. Available with the WebNetSec plan.",[109],"/website-vulnerability-scanning/website-scanner","Unlock AppSec compliance",{"title":112,"slug":113,"text":114,"link":64,"external":37,"targets":115,"cta":67,"variant":68,"campaign_id":20},"Compliance - Advanced Pentest Reporting (A-B test)","compliance-advanced-pentest-reporting-1","Stop piecing together reports manually. Upgrade today to unlock instant proof for audits.",[66],{"title":117,"slug":118,"text":119,"link":64,"external":37,"targets":120,"cta":121,"variant":58,"campaign_id":20},"Compliance - Integrations (A-B test)","compliance-integrations-1","Disconnected tools will fail your next audit. Unlock the integrations needed for compliance.",[74],"Connect your stack",{"title":123,"slug":124,"text":125,"link":64,"external":37,"targets":126,"cta":82,"variant":68,"campaign_id":20},"Compliance - ML Classifier (A-B test)","compliance-ml-classifier-1","Ghost vulnerabilities drain time and chip your compliance. Upgrade to WebNetSec to stay audit-ready with 50% fewer FPs.",[81],{"title":128,"slug":129,"text":130,"link":64,"external":37,"targets":131,"cta":132,"variant":68,"campaign_id":20},"Compliance - Network Scanner (A-B test)","compliance-network-scanner-1","Unmapped assets are compliance landmines - upgrade your plan with complete attack surface visibility.",[102],"Get deep network scans",{"title":134,"slug":135,"text":136,"link":64,"external":37,"targets":137,"cta":89,"variant":68,"campaign_id":20},"Compliance - Pentest Robots (A-B test)","compliance-pentest-robots-1","Don’t leave compliance to chance - deploy Pentest Robots to quickly automate your audit readiness.",[88],{"title":139,"slug":140,"text":141,"link":64,"external":37,"targets":142,"cta":96,"variant":68,"campaign_id":20},"Compliance - Sniper: Auto-Exploiter (A-B test)","compliance-sniper-auto-exploiter-1","Deliver audit-ready proof instantly and stay compliant 24/7/365 - only with Sniper: Auto-Exploiter. Available with Pentest Suite.",[95],{"title":144,"slug":145,"text":146,"link":64,"external":37,"targets":147,"cta":148,"variant":68,"campaign_id":20},"Compliance - Website Scanner (A-B test)","compliance-website-scanner-1","Web vulnerabilities let in devastating compliance fines. Stay audit-ready with deep, proprietary scans. Available with the WebNetSec plan.",[109],"Upgrade to WebNetSec",["Island",150],{"key":151,"params":152,"result":154},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":153},"{\"text-color\":\"gray\"}",{"head":155},{}]