-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ait-core | pip | <= 2.5.2 |
The vulnerability description explicitly mentions the API wait function as the attack vector. Multiple sources (GitHub advisory, LinkedIn article, and GitHub issue #528) confirm the use of eval() with untrusted input in this function. The eval() function's inherent insecurity when processing uncontrolled strings makes this a clear code injection vulnerability. While other potential vulnerabilities exist in the system (e.g., TLM packet expressions), the CVE-2024-35058 specifically references the wait function as the entry point for RCE.
Ongoing coverage of React2Shell