Description
Hitron CODA-5310 has insufficient filtering for specific parameters in the connection test function. A remote attacker authenticated as an administrator, can use the management page to perform command injection attacks, to execute arbitrary system command, manipulate system or disrupt service.
Published: 2023-06-02
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Hitron Technologies Inc. has provided a problem-solving version to the internet service provider and informed them to upgrade. If there are any issues, please contact the network provider.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-50376 Hitron CODA-5310 has insufficient filtering for specific parameters in the connection test function. A remote attacker authenticated as an administrator, can use the management page to perform command injection attacks, to execute arbitrary system command, manipulate system or disrupt service.
History

Fri, 10 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Hitrontech Coda-5310 Coda-5310 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2025-01-10T18:23:41.287Z

Reserved: 2022-12-20T00:00:00.000Z

Link: CVE-2022-47616

cve-icon Vulnrichment

Updated: 2024-08-03T15:02:35.902Z

cve-icon NVD

Status : Modified

Published: 2023-06-02T11:15:09.997

Modified: 2024-11-21T07:32:16.393

Link: CVE-2022-47616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses