Lucene search

K
vulnrichmentTalosVULNRICHMENT:CVE-2023-50383
HistoryJul 08, 2024 - 3:22 p.m.

CVE-2023-50383

2024-07-0815:22:23
CWE-78
talos
github.com
1
command injection
realtek rtl819x
http requests

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

20.6%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the localPin request’s parameter.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:realtek:rtl819x_software_development_kit:3.4.11:*:*:*:*:*:*:*"
    ],
    "vendor": "realtek",
    "product": "rtl819x_software_development_kit",
    "versions": [
      {
        "status": "affected",
        "version": "3.4.11"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:level_one:wbr6013:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:*"
    ],
    "vendor": "level_one",
    "product": "wbr6013",
    "versions": [
      {
        "status": "affected",
        "version": "rer4_a_v3411b_2t2r_lev_09_170623"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

20.6%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-50383