CVE-2023-40221
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
18/09/2023
Last modified:
02/08/2024
Description
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:socomec:modulys_gp_firmware:01.12.10:*:*:*:*:*:*:* | ||
| cpe:2.3:h:socomec:modulys_gp:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



