Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `targetAPSsid` request's parameter.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899 | Exploit Third Party Advisory |
Configurations
History
11 Jul 2024, 16:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:* cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:* cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:* |
|
First Time |
Level1
Level1 wbr-6013 Firmware Level1 wbr-6013 Realtek rtl819x Jungle Software Development Kit Realtek |
08 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-08 16:15
Updated : 2024-07-11 16:05
NVD link : CVE-2023-50381
Mitre link : CVE-2023-50381
CVE.ORG link : CVE-2023-50381
JSON object : View
Products Affected
level1
- wbr-6013
- wbr-6013_firmware
realtek
- rtl819x_jungle_software_development_kit
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')