mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
24 lines
1.2 KiB
Markdown
24 lines
1.2 KiB
Markdown
![]() |
### [CVE-2023-22374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22374)
|
|||
|

|
|||
|

|
|||
|

|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code. In appliance mode BIG-IP, a successful exploit of this vulnerability can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
No PoCs from references.
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/ARPSyndicate/cvemon
|
|||
|
- https://github.com/H4lo/awesome-IoT-security-article
|
|||
|
- https://github.com/Threekiii/CVE
|
|||
|
- https://github.com/UNC1739/awesome-vulnerability-research
|
|||
|
- https://github.com/f0cus77/awesome-iot-security-resource
|
|||
|
- https://github.com/f1tao/awesome-iot-security-resource
|
|||
|
- https://github.com/wr0x00/Lsploit
|
|||
|
|