First published: Fri May 03 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Struts2 dependency. The issue results from the use of a library that is vulnerable to expression language injection. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Voltronic Power ViewPower Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51593 has been assessed as critical due to its potential for remote code execution by unauthenticated attackers.
To fix CVE-2023-51593, update the Voltronic Power ViewPower Pro software to the latest version that addresses the vulnerability.
CVE-2023-51593 can be exploited through remote code execution attacks that allow attackers to execute arbitrary code.
CVE-2023-51593 affects Voltronic Power ViewPower Pro installations employing vulnerable Struts2 dependencies.
No, exploitation of CVE-2023-51593 does not require authentication, making it particularly dangerous.