First published: Wed Dec 20 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the selectEventConfig method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE.
Affected Software | Affected Version | How to fix |
---|---|---|
Voltronic Power ViewPower Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-1891 is critical due to the potential for remote code execution without authentication.
To fix ZDI-23-1891, users should apply vendor-released patches or updates for the ViewPower Pro software as soon as they are available.
ZDI-23-1891 affects all installations of Voltronic Power's ViewPower Pro that are vulnerable to remote code execution.
Yes, ZDI-23-1891 can be exploited remotely as it does not require authentication to execute arbitrary code.
Failing to address ZDI-23-1891 poses a significant risk as attackers could gain control over affected systems leading to data breaches or system compromise.