Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating to
R322.3, R330.2 or the most recent version of this product2.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58151 | Honeywell OneWireless Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating to R322.3, R330.2 or the most recent version of this product2. |
| Link | Providers |
|---|---|
| https://process.honeywell.com/ |
|
Tue, 18 Feb 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 06 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 06 Feb 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Honeywell OneWireless Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating to R322.3, R330.2 or the most recent version of this product2. | |
| Title | OneWireless command injection possible when updating firmware | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2025-02-18T18:13:44.990Z
Reserved: 2023-10-31T13:16:00.514Z
Link: CVE-2023-5878
Updated: 2025-02-06T14:29:17.022Z
Status : Deferred
Published: 2025-02-06T15:15:12.440
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-5878
No data.
OpenCVE Enrichment
Updated: 2025-07-13T21:06:46Z
EUVD