CVE-2024-28297
Description
SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows authenticated users to execute arbitrary SQL commands via unspecified vectors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MyHorus 4.3.5 SQL injection allows unauthenticated attackers to execute arbitrary SQL commands, potentially leading to data breach or RCE.
CVE-2024-28297 is a SQL injection vulnerability in AzureSoft MyHorus, a telemonitoring solution. The flaw exists in version 4.3.5 due to insufficient input validation, allowing an attacker to inject SQL commands via unspecified vectors. While the official CVE description notes authentication is required, public analysis [2] indicates the vulnerability can be exploited without prior authentication.
Exploitation does not require privileged access, making the attack surface broad. An attacker can send crafted requests to the MyHorus application, likely through web interfaces or API endpoints. No special network position is needed; the attacker only needs network access to the affected service [2].
Successful exploitation enables an attacker to execute arbitrary SQL statements, leading to unauthorized data access, modification, or deletion. This could compromise sensitive security data and potentially escalate to remote code execution, depending on database configuration and underlying system.
As of the CVE publication date ([2024-08-02]), no official patch has been announced by AzureSoft [1]. Users are advised to apply general security measures such as network segmentation and input sanitization until a vendor update is available.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.