Description
A vulnerability was found in TamronOS up to 20230703. It has been classified as critical. This affects an unknown part of the file /api/ping. The manipulation of the argument host leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233475. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2023-07-10
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44255 A vulnerability was found in TamronOS up to 20230703. It has been classified as critical. This affects an unknown part of the file /api/ping. The manipulation of the argument host leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233475. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
History

No history.

Subscriptions

Tamronos Tamronos
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-08-02T07:01:56.825Z

Reserved: 2023-07-10T19:37:54.234Z

Link: CVE-2023-3606

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-07-10T21:15:10.823

Modified: 2024-11-21T08:17:39.240

Link: CVE-2023-3606

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses