Vulnerability Description
Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `peerPin` request's parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtek | Rtl819X Jungle Software Development Kit | 3.4.11 |
| Level1 | Wbr-6013 Firmware | rer4_a_v3411b_2t2r_lev_09_170623 |
| Level1 | Wbr-6013 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899Third Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899Third Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1899
FAQ
What is CVE-2023-50382?
CVE-2023-50382 is a vulnerability with a CVSS score of 7.2 (HIGH). Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execu...
How severe is CVE-2023-50382?
CVE-2023-50382 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-50382?
Check the references section above for vendor advisories and patch information. Affected products include: Realtek Rtl819X Jungle Software Development Kit, Level1 Wbr-6013 Firmware, Level1 Wbr-6013.