cve/2023/CVE-2023-3741.md

39 lines
2.6 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-3741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3741)
![](https://img.shields.io/static/v1?label=Product&message=ITK-12D-1(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-12D-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-12DG-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32LCG-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32LCGS-1(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32LCGS-1A(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32LCGS-1P(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32TCG-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32TCGS-1(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32TCGS-1A(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-32TCGS-1P(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-6D-1(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-6D-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-6DG-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-6DGS-1(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-6DGS-1A(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-6DGS-1P(BK)%20TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-8LCG-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-8LCX-1(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-8LCX-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-8TCGX-1(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ITK-8TCGX-1P(BK)TEL&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20all%20versions%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command&color=brighgreen)
### Description
An OS Command injection vulnerability in NEC Platforms DT900 and DT900S Series all versions allows an attacker to execute any command on the device.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/kherrick/lobsters