First published: Sat Sep 16 2023(Updated: )
An issue in NETIS SYSTEMS WF2409Ev4 v.1.0.1.705 allows a remote attacker to execute arbitrary code and obtain sensitive information via the password parameter in the /etc/shadow.sample component.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netis-systems Wf2409e Firmware | =1.0.1.705 | |
Netis-systems Wf2409e | =v4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-42336 is critical with a CVSS score of 9.8.
A remote attacker can exploit CVE-2023-42336 by sending a malicious request with a specially crafted password parameter to the /etc/shadow.sample component.
By exploiting CVE-2023-42336, a remote attacker can execute arbitrary code and obtain sensitive information.
Currently, there is no known fix available for CVE-2023-42336. It is recommended to follow the vendor's advisory for any updates or patches.
You can find more information about CVE-2023-42336 at the following reference link: [GitHub - Root Hard Code.md](https://github.com/adhikara13/CVE/blob/main/netis_WF2409E/Root_Hard_Code.md)