Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: snyk
Published: 2024-01-30T05:00:01.547Z
Updated: 2025-06-17T21:29:18.642Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21488

Updated: 2025-06-17T21:22:45.039Z

Status : Modified
Published: 2024-01-30T05:15:09.277
Modified: 2024-11-21T08:54:32.133
Link: CVE-2024-21488

No data.