Lucene search

K
nvd[email protected]NVD:CVE-2023-43892
HistoryOct 02, 2023 - 10:15 p.m.

CVE-2023-43892

2023-10-0222:15:10
CWE-78
web.nvd.nist.gov
1
netis n3mv2-v1.0.1.865
command injection
vulnerability
hostname parameter
wan settings
crafted payload

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.9%

Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the Hostname parameter within the WAN settings. This vulnerability is exploited via a crafted payload.

Affected configurations

Nvd
Node
netis-systemsn3m_firmwareMatch1.0.1.865
AND
netis-systemsn3mMatchv2
VendorProductVersionCPE
netis-systemsn3m_firmware1.0.1.865cpe:2.3:o:netis-systems:n3m_firmware:1.0.1.865:*:*:*:*:*:*:*
netis-systemsn3mv2cpe:2.3:h:netis-systems:n3m:v2:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

46.9%

Related for NVD:CVE-2023-43892