First published: Mon Oct 02 2023(Updated: )
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the wakeup_mac parameter in the Wake-On-LAN (WoL) function. This vulnerability is exploited via a crafted payload.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netis-systems N3m Firmware | =1.0.1.865 | |
Netis-systems N3m | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2023-43893.
The severity of CVE-2023-43893 is critical with a CVSS score of 9.8.
The vulnerability in Netis N3Mv2-V1.0.1.865 occurs due to a command injection via the wakeup_mac parameter in the Wake-On-LAN (WoL) function.
This vulnerability can be exploited using a crafted payload.
There is no information available regarding a fix for this vulnerability at the moment.