CVE-2023-46306
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
22/10/2023
Last modified:
12/09/2024
Description
The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
Impact
Base Score 3.x
6.60
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:* | 4.6.0.105 (excluding) | |
| cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:* | 4.7.0.0 (including) | 4.7.0.103 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



