Description
Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the MonitorConsole class. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22011.
Published: 2024-05-03
Score: 9.8 Critical
EPSS: 6.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-56287 Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MonitorConsole class. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22011.
History

Wed, 09 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Voltronicpower
Voltronicpower viewpower
CPEs cpe:2.3:a:voltronicpower:viewpower:1.04.21353:*:*:*:-:*:*:*
Vendors & Products Voltronicpower
Voltronicpower viewpower

Subscriptions

Voltronicpower Viewpower
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-02T22:40:33.931Z

Reserved: 2023-12-20T20:38:20.867Z

Link: CVE-2023-51575

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:33.931Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-03T03:16:16.747

Modified: 2025-07-09T16:56:43.237

Link: CVE-2023-51575

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses