First published: Tue Feb 06 2024(Updated: )
An OS command injection vulnerability in Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
eCharge Hardy Barth cPH2 | ||
eCharge Hardy Barth cPH2 | <=1.87.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46359 has been rated as a high-severity vulnerability due to the potential for unauthenticated remote command execution.
To mitigate CVE-2023-46359, update the Hardy Barth cPH2 eCharge Ladestation firmware to version 1.87.1 or later.
CVE-2023-46359 affects users of Hardy Barth cPH2 eCharge Ladestation versions 1.87.0 and earlier.
CVE-2023-46359 is classified as an OS command injection vulnerability.
CVE-2023-46359 can be exploited by sending specially crafted arguments to the connectivity check feature, allowing command execution.