Two critical security vulnerabilities emerged in the Traccar GPS tracking system, allowing unauthenticated attackers to obtain remote code execution Routing unrestricted file upload errors among the vulnerabilities identified as CVE-2024-24809 (CVSS score). : 8.5) and CVE-2024-31214 (CVSS score : 9.7). And there is, especially on systems where guest registration in Traccar has been enabled by default 5, as confirmed by Horizon3.ai analyst Navin Sunakavalli. CVE-2024-24809 allows attackers to change file paths, while CVE-2024-31214 allows unrestricted uploading of machine image files, and allows attackers to upload arbitrary files to the file system by overwriting a specific file, such as a crontab or kernel module, . depending on the operating system used That could be the kill. Naming restrictions on Debian/Ubuntu-based systems can prevent some exploits, but on Windows an attacker can achieve remote code execution by placing a malicious shortcut file in the startup folder These vulnerabilities affect Traccar versions 5.1 through 5.12. The issues were fixed in the April 2024 release of Traccar 6 which enables default registration to reduce the attack surface. Users are advised to update to the latest version to mitigate these risks.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...