2023-12-09 09:00:23 +00:00
{
"id" : "CVE-2023-47254" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-12-09T08:15:06.787" ,
2023-12-12 23:00:22 +00:00
"lastModified" : "2023-12-12T22:33:48.820" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-09 09:00:23 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface."
2023-12-12 23:00:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una inyecci\u00f3n de comando del sistema operativo en la interfaz CLI en DrayTek Vigor167 versi\u00f3n 5.2.2 permite a atacantes remotos ejecutar comandos arbitrarios del sistema y escalar privilegios a trav\u00e9s de cualquier cuenta creada dentro de la interfaz web."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-05-19 02:03:31 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:draytek:vigor167:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "71A66A89-CF31-4C63-9562-707C03117104"
2023-12-12 23:00:22 +00:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-05-19 02:03:31 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:draytek:vigor167_firmware:5.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8ADA814-1612-48FD-BB70-B71D00CE3233"
2023-12-12 23:00:22 +00:00
}
]
}
]
2023-12-09 09:00:23 +00:00
}
] ,
"references" : [
{
"url" : "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt" ,
2023-12-12 23:00:22 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-12-09 09:00:23 +00:00
} ,
{
"url" : "https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023" ,
2023-12-12 23:00:22 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-12-09 09:00:23 +00:00
}
]
}