A vulnerability was found in Chengdu VEC40G 3.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=access_detect of the component Network Detection. The manipulation of the argument COUNT with the input 3 | netstat -an leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228013 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/eckert-lcc/cve/blob/main/Flying%20fish%20star.md | Exploit |
https://vuldb.com/?ctiid.228013 | Permissions Required |
https://vuldb.com/?id.228013 | Permissions Required |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-04 18:15
Updated : 2024-05-17 02:23
NVD link : CVE-2023-2522
Mitre link : CVE-2023-2522
CVE.ORG link : CVE-2023-2522
JSON object : View
Products Affected
feiyuxing
- vec40g_firmware
- vec40g
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')