Command Injection

CVE-2024-50365

Summary

A CWE-78 “Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')” was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "lan_apply" API which are not properly sanitized before being concatenated to OS level commands.

Impact

The vulnerability can be exploited by authenticated users to gain full, unrestricted root access to the wireless access point.

Issue Date

November 26, 2025

Affects

The following products and firmware versions are affected: EKI-6333AC-2G ≤ v1.6.3 EKI-6333AC-2GD ≤ v1.6.3 EKI-6333AC-1GPO ≤ v1.2.1

CVE Name

CVE-2024-50365

CVSS Details

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS Score

7.2

Solution

Update affected products to the following firmware versions released by Advantech: - EKI-6333AC-2G: v1.6.5 - EKI-6333AC-2GD: v1.6.5 - EKI-6333AC-1GPO: v1.2.2

Mitigations

Acknowledgements

Diego Zaffaroni of Nozomi Networks

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Threat Actor Activity Related to the Iran Conflict

Read

Fuzzing Protocol Implementations: 10 Vulnerabilities in the P-Net PROFINET Library

Read

Major Power Outage Hits Spain and Portugal: Spotlight on Critical Energy Infrastructure Vulnerabilities 

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.