An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-38436 An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 20:30:00 +0000


Wed, 18 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:peplink:surf_soho:hw1:-:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-11-04T19:16:45.332Z

Reserved: 2023-06-14T20:04:18.559Z

Link: CVE-2023-34356

cve-icon Vulnrichment

Updated: 2024-08-02T16:10:06.648Z

cve-icon NVD

Status : Modified

Published: 2023-10-11T16:15:13.320

Modified: 2025-11-04T20:16:31.770

Link: CVE-2023-34356

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses