VYPR
Medium severity6.3NVD Advisory· Published Jun 20, 2024· Updated Apr 15, 2026

CVE-2024-33335

CVE-2024-33335

Description

SQL Injection vulnerability in H3C technology company SeaSQL DWS V2.0 allows a remote attacker to execute arbitrary code via a crafted file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in H3C SeaSQL DWS V2.0 allows remote code execution via crafted file.

Root

Cause

CVE-2024-33335 is a SQL injection vulnerability in H3C's SeaSQL DWS V2.0, specifically version 2.0.1-1 [1][3]. The flaw resides in the way the application processes crafted input, enabling an attacker to inject arbitrary SQL commands into backend queries.

Attack

Vector

A remote attacker can exploit this vulnerability without requiring prior authentication by sending a specially crafted file to the affected service [3]. The attacker only needs network access to the SeaSQL DWS instance to deliver the malicious input.

Impact

Successful exploitation of the SQL injection allows the attacker to execute arbitrary code on the underlying database server [1][3]. This could lead to complete compromise of the data warehouse, including data exfiltration, modification, or denial of service.

Mitigation

As of the publication date (2024-06-20), H3C has not released a patch for this vulnerability. The vendor's security advisory page [1] does not list this CVE, and the official product page [2] does not provide a security update. Users should apply input validation and parameterized queries as a workaround until a fix is available.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.