8.8

CVE-2023-23295

Exploit

Korenix Jetwave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection via /goform/formSysCmd. An attacker an modify the sysCmd parameter in order to execute commands as root.

Data is provided by the National Vulnerability Database (NVD)
KorenixJetwave 2212g Firmware Version1.3.t
   KorenixJetwave 2212g Version-
KorenixJetwave 2212x Firmware Version1.3.0
   KorenixJetwave 2212x Version-
KorenixJetwave 2212s Firmware Version1.3.0
   KorenixJetwave 2212s Version-
KorenixJetwave 2211c Firmware Version < 1.6
   KorenixJetwave 2211c Version-
KorenixJetwave 2411 Firmware Version < 1.5
   KorenixJetwave 2411 Version-
KorenixJetwave 2111 Firmware Version < 1.5
   KorenixJetwave 2111 Version-
KorenixJetwave 2411l Firmware Version < 1.6
   KorenixJetwave 2411l Version-
KorenixJetwave 2111l Firmware Version < 1.6
   KorenixJetwave 2111l Version-
KorenixJetwave 2414 Firmware Version < 1.4
   KorenixJetwave 2414 Version-
KorenixJetwave 2114 Firmware Version < 1.4
   KorenixJetwave 2114 Version-
KorenixJetwave 2424 Firmware Version < 1.3
   KorenixJetwave 2414 Version-
KorenixJetwave 2460 Firmware Version < 1.6
   KorenixJetwave 2460 Version-
KorenixJetwave 4221hp-e Firmware Version <= 1.3.0
   KorenixJetwave 4221hp-e Version-
KorenixJetwave 3220 V3 Firmware Version < 1.7
   KorenixJetwave 3220 V3 Version-
KorenixJetwave 3420 V3 Firmware Version < 1.7
   KorenixJetwave 3420 V3 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.7% 0.806
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.