Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-49254
HistoryJan 12, 2024 - 3:15 p.m.

Design/Logic Flaw

2024-01-1215:15:00
PRIOn knowledge base
www.prio-n.com
3
authenticated user
root user context
payload
destination field
cve-2021-28151
blacklisting characters
javascript
exploited
post requests

7.8 High

AI Score

Confidence

Low

0.964 High

EPSS

Percentile

99.6%

Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the “destination” field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.

CPENameOperatorVersion
h8951-4g-esp_firmwarelt2310271149

7.8 High

AI Score

Confidence

Low

0.964 High

EPSS

Percentile

99.6%