lte-pic32-writer is a writer for PIC32 devices. In versions 0.0.1 and prior, those who use `sendto.txt` are vulnerable to attackers who known the IMEI reading the sendto.txt. The sendto.txt file can contain the SNS(such as slack and zulip) URL and API key. As of time of publication, a patch is not yet available. As workarounds, avoid using `sendto.txt` or use `.htaccess` to block access to `sendto.txt`.
References
Link | Resource |
---|---|
https://github.com/paijp/lte-pic32-writer/security/advisories/GHSA-9qgg-ph2v-v4mh | Vendor Advisory |
https://github.com/paijp/lte-pic32-writer/security/advisories/GHSA-9qgg-ph2v-v4mh | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-31 16:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46723
Mitre link : CVE-2023-46723
CVE.ORG link : CVE-2023-46723
JSON object : View
Products Affected
pajip
- lte-pic32-writer
CWE
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
NVD-CWE-noinfo