๐Ÿ” CVE Alert

CVE-2024-33434

CRITICAL 9.8
CVSS Score
9.8
EPSS Score
5.6%
EPSS Percentile
90th

An issue in tiagorlampert CHAOS v5.0.1 before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the `filename` argument into the `buildStr` string without any sanitization or filtering.

Vendor n/a
Product n/a
Published May 7, 2024
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for n/a n/a

Be the first to know when new critical vulnerabilities affecting n/a n/a are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

n/a / n/a
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/tiagorlampert/CHAOS/pull/95 gist.github.com: https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496 web.archive.org: https://web.archive.org/web/20240406061035/https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/