PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow an attacker to gain root access by running a crafted binary leveraging an exported function from a shared library. The attacker must have shell access to the device in order to exploit this vulnerability.
References
Configurations
Configuration 1 (hide)
AND |
|
History
23 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jul 2023, 19:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:paxtechnology:pax_a930_firmware:paydroid_7.1.1_virgo_v04.5.02_20220722:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:pax_a930:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
First Time |
Paxtechnology
Paxtechnology pax A930 Firmware Paxtechnology pax A930 |
|
CWE | NVD-CWE-Other | |
References | (MISC) https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2023/CVEs/CVE-2023-27197.md - Third Party Advisory |
05 Jul 2023, 20:31
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-05 20:15
Updated : 2024-04-23 14:15
NVD link : CVE-2023-27197
Mitre link : CVE-2023-27197
CVE.ORG link : CVE-2023-27197
JSON object : View
Products Affected
paxtechnology
- pax_a930_firmware
- pax_a930
CWE