109 lines
2.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2023-27826",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-12T13:15:07.573",
"lastModified": "2023-04-19T19:31:38.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SeowonIntech SWC 5100W WIMAX Bootloader 1.18.19.0, HW 0.0.7.0, and FW 1.11.0.1, 1.9.9.4 are vulnerable to OS Command Injection. which allows attackers to take over the system with root privilege by abusing doSystem() function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seowonintech:swc-5100w_firmware:1.9.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A87515A7-7BC2-40C9-ABC7-AFBD140D78AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seowonintech:swc-5100w_firmware:1.11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2D3D17-8900-4C3E-9A22-AD0E1564A4B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:seowonintech:swc-5100w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07996E93-A808-4A07-8C3D-5734B3D971ED"
}
]
}
]
}
],
"references": [
{
"url": "https://pastebin.com/raw/buhVV7iL",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://usermanual.wiki/SEOWON-INTECH/SWC5100W",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.exploit-db.com/exploits/51311",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}