CVE-2023-22598

InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). An unauthorized user with privileged access to the local web interface or the cloud account managing the affected devices could push a specially crafted configuration update file to gain root access. This could lead to remote code execution with root privileges.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inhandnetworks:inrouter302_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:inrouter302:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inhandnetworks:inrouter615-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inhandnetworks:inrouter615-s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
Summary
  • (es) InHand Networks InRouter 302, anterior a la versión IR302 V3.5.56, e InRouter 615, anterior a la versión InRouter6XX-S-V2.3.0.r5542, contienen la vulnerabilidad CWE-78: Neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('OS Command Injection'). Un usuario no autorizado con acceso privilegiado a la interfaz web local o a la cuenta en la nube que administra los dispositivos afectados podría enviar un archivo de actualización de configuración especialmente diseñado para obtener acceso raíz. Esto podría conducir a la ejecución remota de código con privilegios de root.
References () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-03 - Third Party Advisory, US Government Resource

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). An unauthorized user with privileged access to the local web interface or the cloud account managing the affected devices could push a specially crafted configuration update file to gain root access. This could lead to remote code execution with root privileges. InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). An unauthorized user with privileged access to the local web interface or the cloud account managing the affected devices could push a specially crafted configuration update file to gain root access. This could lead to remote code execution with root privileges.

Information

Published : 2023-01-12 23:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22598

Mitre link : CVE-2023-22598

CVE.ORG link : CVE-2023-22598


JSON object : View

Products Affected

inhandnetworks

  • inrouter302_firmware
  • inrouter302
  • inrouter615-s
  • inrouter615-s_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')