GobyVuls/Honeywell_PM43_loadfile.lp_file_command_execution_vulnerability.md

13 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

## Honeywell PM43 loadfile.lp file command execution vulnerability (CVE-2023-3710)
| **Vulnerability** | Honeywell PM43 loadfile.lp file command execution vulnerability (CVE-2023-3710) |
| :----: | :-----|
| **Chinese name** | Honeywell PM43 loadfile.lp 文件命令执行漏洞CVE-2023-3710 |
| **CVSS core** | 9.8 |
| **FOFA Query** (click to view the results directly)| [app="Honeywell PM43 "](https://en.fofa.info/result?qbase64=aGVhZGVyPSJQTTQzIiB8fCBiYW5uZXI9IlBNNDMiIHx8IHRpdGxlPSJQTTQzIiB8fCBib2R5PSIvbWFpbi9sb2dpbi5sdWE%2FcGFnZWlkPUNvbmZpZ3VyZSI%3D)|
| **Number of assets affected** | 96 |
| **Description** | The Honeywell PM43 is a printer product of the American company Honeywell.Honeywell PM43P10.19.050004 and earlier versions of the input verification error vulnerability, attackers can arbitrarily execute code on the server side, write a backdoor, obtain server permissions, and then control the entire web server. |
| **Impact** | Honeywell PM43P10.19.050004 and earlier versions of the input verification error vulnerability, attackers can arbitrarily execute code on the server side, write a backdoor, obtain server permissions, and then control the entire web server. |
![](https://s3.bmp.ovh/imgs/2023/10/17/ff602decce69f83b.gif)