9.9

CVE-2024-37023

Multiple OS command injection vulnerabilities affecting Vonets 

 industrial wifi bridge relays and wifi bridge repeaters, software 
versions 3.3.23.6.9 and prior, enable an authenticated remote attacker 
to execute arbitrary OS commands via various endpoint parameters.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VonetsVar1200-h Firmware Version <= 3.3.23.6.9
   VonetsVar1200-h Version-
VonetsVar1200-l Firmware Version <= 3.3.23.6.9
   VonetsVar1200-l Version-
VonetsVar600-h Firmware Version <= 3.3.23.6.9
   VonetsVar600-h Version-
VonetsVap11ac Firmware Version <= 3.3.23.6.9
   VonetsVap11ac Version-
VonetsVap11g-500s Firmware Version <= 3.3.23.6.9
   VonetsVap11g-500s Version-
VonetsVbg1200 Firmware Version <= 3.3.23.6.9
   VonetsVbg1200 Version-
VonetsVap11s-5g Firmware Version <= 3.3.23.6.9
   VonetsVap11s-5g Version-
VonetsVap11s Firmware Version <= 3.3.23.6.9
   VonetsVap11s Version-
VonetsVar11n-300 Firmware Version <= 3.3.23.6.9
   VonetsVar11n-300 Version-
VonetsVap11g-300 Firmware Version <= 3.3.23.6.9
   VonetsVap11g-300 Version-
VonetsVap11n-300 Firmware Version <= 3.3.23.6.9
   VonetsVap11n-300 Version-
VonetsVap11g Firmware Version <= 3.3.23.6.9
   VonetsVap11g Version-
VonetsVap11g-500 Firmware Version <= 3.3.23.6.9
   VonetsVap11g-500 Version-
VonetsVga-1000 Firmware Version <= 3.3.23.6.9
   VonetsVga-1000 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.51% 0.655
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
ics-cert@hq.dhs.gov 9.4 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
ics-cert@hq.dhs.gov 9.1 2.3 6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.