Vulnerability Description
processCommandSetUid() in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to execute arbitrary system commands as the root user.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Skymee | Petalk Ai Firmware | 3.2.2.30 |
| Skymee | Petalk Ai | - |
| Petwant | Pf-103 Firmware | 4.22.2.42 |
| Petwant | Pf-103 | - |
Related Weaknesses (CWE)
References
- https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562ExploitThird Party Advisory
- https://blog.securityevaluators.com/remotely-exploiting-iot-pet-feeders-21013562ExploitThird Party Advisory
FAQ
What is CVE-2019-16733?
CVE-2019-16733 is a vulnerability with a CVSS score of 9.8 (CRITICAL). processCommandSetUid() in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to execute arbitrary system commands as the root user.
How severe is CVE-2019-16733?
CVE-2019-16733 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-16733?
Check the references section above for vendor advisories and patch information. Affected products include: Skymee Petalk Ai Firmware, Skymee Petalk Ai, Petwant Pf-103 Firmware, Petwant Pf-103.