Description
SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34876 | SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default). |
References
| Link | Providers |
|---|---|
| https://github.com/Toxich4/CVE-2023-30459 |
|
| https://smartptt.com |
|
History
Thu, 06 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-06T21:00:59.768Z
Reserved: 2023-04-10T00:00:00.000Z
Link: CVE-2023-30459
Updated: 2024-08-02T14:28:50.576Z
Status : Modified
Published: 2023-04-14T15:15:07.657
Modified: 2025-02-06T21:15:20.813
Link: CVE-2023-30459
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD