Vulnerability Description
An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Peplink | Surf Soho Firmware | 6.3.5 |
| Peplink | Surf Soho | hw1 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778ExploitProductThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778ExploitProductThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1778
FAQ
What is CVE-2023-34356?
CVE-2023-34356 is a vulnerability with a CVSS score of 7.2 (HIGH). An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attack...
How severe is CVE-2023-34356?
CVE-2023-34356 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-34356?
Check the references section above for vendor advisories and patch information. Affected products include: Peplink Surf Soho Firmware, Peplink Surf Soho.