CVE-2023-46306

Severity CVSS v4.0:
Pending analysis
Type:
CWE-78 OS Command Injections
Publication date:
22/10/2023
Last modified:
12/09/2024

Description

The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.

Vulnerable products and versions

CPE From Up to
cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*
cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*
cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:* 4.6.0.105 (excluding)
cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:* 4.7.0.0 (including) 4.7.0.103 (excluding)