Description
Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53256 | Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly. |
References
History
Fri, 20 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-06-20T16:40:13.313Z
Reserved: 2023-11-24T11:53:46.294Z
Link: CVE-2023-49254
Updated: 2024-08-02T21:53:44.880Z
Status : Modified
Published: 2024-01-12T15:15:09.017
Modified: 2025-06-20T17:15:32.833
Link: CVE-2023-49254
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD