Lucene search

K
zdiAnonymousZDI-23-1796
HistoryDec 15, 2023 - 12:00 a.m.

Schneider Electric C-Bus Toolkit FileCommand Directory Traversal Remote Code Execution Vulnerability

2023-12-1500:00:00
Anonymous
www.zerodayinitiative.com
5
schneider electric
c-bus toolkit
remote code execution
vulnerability
authentication
file operations
network service

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.8%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric C-Bus Toolkit. Authentication is not required to exploit this vulnerability. The specific flaw exists within the FileCommand command. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.8%

Related for ZDI-23-1796