{"uuid": "eee2580e-d193-49b3-8757-147a8192f867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5461", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4519", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5461\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Implementation of the Simple Network \nManagement Protocol (SNMP) operating on the Brocade 6547 (FC5022) \nembedded switch blade, makes internal script calls to system.sh from \nwithin the SNMP binary. An authenticated attacker could perform command \nor parameter injection on SNMP operations that are only enabled on the \nBrocade 6547 (FC5022) embedded switch. This injection could allow the \nauthenticated attacker to issue commands as Root.\n\ud83d\udccf Published: 2025-02-15T00:32:47Z\n\ud83d\udccf Modified: 2025-02-15T00:32:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-5461\n2. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24411", "creation_timestamp": "2025-02-15T01:11:35.000000Z"}