First published: Wed Nov 15 2023(Updated: )
An issue in Kloudq Technologies Limited Tor Equip 1.0, Tor Loco Mini 1.0 through 3.1 allows a remote attacker to execute arbitrary code via a crafted request to the MQTT component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kloudq Tor Loco Min | >=1.0<=3.1 | |
Kloudq Tor Equip Gateway | =1.0 | |
Kloudq Tor Shield | =1.0 | |
Kloudq Tor Lenz | =0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-41442.
The severity level of CVE-2023-41442 is critical (9.8).
The affected software products are Kloudq Tor Loco Mini (versions 1.0 through 3.1), Kloudq Tor Equip Gateway (version 1.0), Kloudq Tor Shield (version 1.0), and Kloudq Tor Lenz (version 0.0.1).
A remote attacker can exploit CVE-2023-41442 by sending a crafted request to the MQTT component.
Yes, you can find more information about CVE-2023-41442 [here](https://writeups.ayyappan.me/v/tor-iot-mqtt/).