Description
Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
Published: 2024-01-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-53256 Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
History

Fri, 20 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Hongdian H8951-4g-esp H8951-4g-esp Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2025-06-20T16:40:13.313Z

Reserved: 2023-11-24T11:53:46.294Z

Link: CVE-2023-49254

cve-icon Vulnrichment

Updated: 2024-08-02T21:53:44.880Z

cve-icon NVD

Status : Modified

Published: 2024-01-12T15:15:09.017

Modified: 2025-06-20T17:15:32.833

Link: CVE-2023-49254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses