This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-53196 | A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges. |
Thu, 20 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-03-20T20:14:08.699Z
Reserved: 2022-05-30T10:21:52.587Z
Link: CVE-2022-31808
Updated: 2024-08-03T07:26:01.373Z
Status : Modified
Published: 2023-02-14T11:15:12.700
Modified: 2024-11-21T07:05:22.323
Link: CVE-2022-31808
No data.
OpenCVE Enrichment
No data.
EUVD