The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication
of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45772 | The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2024-09-12T14:30:27.445Z
Reserved: 2023-10-18T09:35:22.497Z
Link: CVE-2023-41255
Updated: 2024-08-02T18:54:04.641Z
Status : Modified
Published: 2023-10-25T18:17:30.737
Modified: 2024-11-21T08:20:55.553
Link: CVE-2023-41255
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD