CVE-2023-46306

The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*
cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*
OR cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.6
v2 : unknown
v3 : 8.4
References () https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/ - Product, Third Party Advisory () https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/ - Product, Third Party Advisory
References () https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf - Release Notes () https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf - Release Notes
References () https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf - Release Notes () https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf - Release Notes

02 Nov 2023, 15:47

Type Values Removed Values Added
CPE cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*
cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*
CWE CWE-78
References (MISC) https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/ - (MISC) https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/ - Product, Third Party Advisory
References (MISC) https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf - (MISC) https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf - Release Notes
References (MISC) https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf - (MISC) https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf - Release Notes
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.6
First Time Netmodule nb1800
Netmodule nb2810
Netmodule nb1810
Netmodule netmodule Router Software
Netmodule
Netmodule nb1601
Netmodule ng800
Netmodule nb3701
Netmodule nb2800
Netmodule nb3800

22 Oct 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-22 21:15

Updated : 2024-11-21 08:28


NVD link : CVE-2023-46306

Mitre link : CVE-2023-46306

CVE.ORG link : CVE-2023-46306


JSON object : View

Products Affected

netmodule

  • nb1800
  • nb2800
  • nb1810
  • ng800
  • netmodule_router_software
  • nb3800
  • nb2810
  • nb1601
  • nb3701
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')