๐Ÿ” CVE Alert

CVE-2024-58275

UNKNOWN 0.0

Easywall 0.3.1 - Authentication Bypass via Command Injection in /ports-save Endpoint

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server.

CWE CWE-88
Vendor jpylypiw
Product easywall
Published Dec 4, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for jpylypiw easywall

Be the first to know when new unknown vulnerabilities affecting jpylypiw easywall are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

jpylypiw / Easywall
0.3.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/51856 jpylypiw.github.io: https://jpylypiw.github.io/easywall/ github.com: https://github.com/jpylypiw/easywall vulncheck.com: https://www.vulncheck.com/advisories/easywall-031-authentication-bypass-via-command-injection-in-ports-save-endpoint

Credits

Melvin Mejia