Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53256 | Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-06-20T16:40:13.313Z
Reserved: 2023-11-24T11:53:46.294Z
Link: CVE-2023-49254
Updated: 2024-08-02T21:53:44.880Z
Status : Modified
Published: 2024-01-12T15:15:09.017
Modified: 2025-06-20T17:15:32.833
Link: CVE-2023-49254
No data.
OpenCVE Enrichment
No data.
EUVD