mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-05 10:17:57 +00:00
18 lines
1.1 KiB
Markdown
18 lines
1.1 KiB
Markdown
![]() |
### [CVE-2023-35193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35193)
|
||
|

|
||
|
%20&color=brighgreen)
|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset 0x4bddb8.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|