A post-authentication remote command injection vulnerability in a CGI file in Western Digital My Cloud OS 5 devices that could allow an attacker to build files with redirects and execute larger payloads.
This issue affects My Cloud OS 5 devices: before 5.26.300.
This issue affects My Cloud OS 5 devices: before 5.26.300.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-26928 | A post-authentication remote command injection vulnerability in a CGI file in Western Digital My Cloud OS 5 devices that could allow an attacker to build files with redirects and execute larger payloads. This issue affects My Cloud OS 5 devices: before 5.26.300. |
Fixes
Solution
Western Digital recommends that users promptly update their devices to the latest firmware by clicking on the firmware update notification.
Workaround
No workaround given by the vendor.
References
History
Thu, 05 Sep 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A post-authentication remote command injection vulnerability in a CGI file in Western Digital My Cloud OS 5 devices that could allow an attacker to build files with redirects and execute larger payloads. This issue affects My Cloud OS 5 devices: before 5.26.300. | A post-authentication remote command injection vulnerability in a CGI file in Western Digital My Cloud OS 5 devices that could allow an attacker to build files with redirects and execute larger payloads. This issue affects My Cloud OS 5 devices: before 5.26.300. |
Weaknesses | CWE-78 |

Status: PUBLISHED
Assigner: WDC PSIRT
Published:
Updated: 2024-09-09T14:39:16.112Z
Reserved: 2023-01-06T20:23:44.301Z
Link: CVE-2023-22816

Updated: 2024-08-02T10:20:31.058Z

Status : Modified
Published: 2023-06-30T22:15:09.883
Modified: 2024-11-21T07:45:28.480
Link: CVE-2023-22816

No data.

No data.