Lucene search

K
cve[email protected]CVE-2023-35193
HistoryOct 11, 2023 - 4:15 p.m.

CVE-2023-35193

2023-10-1116:15:13
CWE-78
web.nvd.nist.gov
15
cve-2023-35193
os command injection
peplink surf soho
command execution
vulnerability
nvd

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the system call in the file /web/MANGA/cgi-bin/api.cgi for firmware version 6.3.5 at offset 0x4bddb8.

Affected configurations

Vulners
NVD
Node
peplinksurf_sohoRangev6.3.5 (in QEMU)
VendorProductVersionCPE
peplinksurf_soho*cpe:2.3:h:peplink:surf_soho:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Peplink",
    "product": "Surf SOHO HW1",
    "versions": [
      {
        "version": "v6.3.5 (in QEMU)",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

Related for CVE-2023-35193