
CVE-2024-13870 – Unauthenticated Firmware Downgrade in Bitdefender Box v1
https://notcve.org/view.php?id=CVE-2024-13870
12 Mar 2025 — An improper access control vulnerability exists in Bitdefender Box 1 (firmware version 1.3.52.928 and below) that allows an unauthenticated attacker to downgrade the device's firmware to an older, potentially vulnerable version of a Bitdefender-signed firmware. The attack requires Bitdefender BOX to be booted in Recovery Mode and that the attacker be present within the WiFi range of the BOX unit. • https://bitdefender.com/support/security-advisories/unauthenticated-firmware-downgrade-in-bitdefender-box-v1 • CWE-1328: Security Version Number Mutable to Older Versions •

CVE-2024-13871 – Unauthenticated Command Injection in Bitdefender BOX v1
https://notcve.org/view.php?id=CVE-2024-13871
12 Mar 2025 — A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE). A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent... • https://bitdefender.com/support/security-advisories/unauthenticated-command-injection-in-bitdefender-box-v1 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-13872 – Bitdefender Box Insecure Update Mechanism Vulnerability in libboxhermes.so
https://notcve.org/view.php?id=CVE-2024-13872
12 Mar 2025 — Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device. • https://bitdefender.com/support/security-advisories/insecure-update-mechanism-vulnerability-in-libboxhermes-so-in-bitdefender-box-v1 • CWE-319: Cleartext Transmission of Sensitive Information •