Unknown
CVE-2023-31473
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-31473
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An issue was discovered on GL.iNet devices before 3.216. There is an arbitrary file write in which an empty file can be created anywhere on the filesystem. This is caused by a command injection vulnerability with a filter applied. Through the software installation feature, it is possible to inject arbitrary parameters in a request to cause opkg to read an arbitrary file name while using root privileges. The -f option can be used with a configuration file.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- gl-a1300 firmware,
- gl-ap1300 firmware,
- gl-ap1300lte firmware,
- gl-ar300m firmware,
- gl-ar750 firmware,
- gl-ar750s firmware,
- gl-ax1800 firmware,
- gl-axt1800 firmware,
- gl-b1300 firmware,
- gl-b2200 firmware,
- gl-e750 firmware,
- gl-mifi firmware,
- gl-mt1300 firmware,
- gl-mt2500 firmware,
- gl-mt2500a firmware,
- gl-mt3000 firmware,
- gl-mt300n-v2 firmware,
- gl-mv1000 firmware,
- gl-mv1000w firmware,
- gl-s10 firmware,
- gl-s1300 firmware,
- gl-s20 firmware,
- gl-s200 firmware,
- gl-sf1200 firmware,
- gl-sft1200 firmware,
- gl-usb150 firmware,
- gl-x1200 firmware,
- gl-x3000 firmware,
- gl-x300b firmware,
- gl-x750 firmware,
- gl-xe300 firmware,
- microuter-n300 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: