René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

109 lines
2.8 KiB
JSON

{
"id": "CVE-2023-27826",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-12T13:15:07.573",
"lastModified": "2023-04-19T19:31:38.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SeowonIntech SWC 5100W WIMAX Bootloader 1.18.19.0, HW 0.0.7.0, and FW 1.11.0.1, 1.9.9.4 are vulnerable to OS Command Injection. which allows attackers to take over the system with root privilege by abusing doSystem() function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seowonintech:swc-5100w_firmware:1.9.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A87515A7-7BC2-40C9-ABC7-AFBD140D78AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seowonintech:swc-5100w_firmware:1.11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2D3D17-8900-4C3E-9A22-AD0E1564A4B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:seowonintech:swc-5100w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07996E93-A808-4A07-8C3D-5734B3D971ED"
}
]
}
]
}
],
"references": [
{
"url": "https://pastebin.com/raw/buhVV7iL",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://usermanual.wiki/SEOWON-INTECH/SWC5100W",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.exploit-db.com/exploits/51311",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}