An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-38436 An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:peplink:surf_soho:hw1:-:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-18T18:47:25.263Z

Reserved: 2023-06-14T20:04:18.559Z

Link: CVE-2023-34356

cve-icon Vulnrichment

Updated: 2024-08-02T16:10:06.648Z

cve-icon NVD

Status : Modified

Published: 2023-10-11T16:15:13.320

Modified: 2024-11-21T08:07:05.250

Link: CVE-2023-34356

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.