Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48027 | Path traversal vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent authenticated attacker to alter critical information such as system files by sending a specially crafted request. They are affected when running in ST(Standalone) mode. |
Fri, 20 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-20T15:10:16.976Z
Reserved: 2023-09-22T04:36:31.640Z
Link: CVE-2023-43627
Updated: 2024-08-02T19:44:43.669Z
Status : Modified
Published: 2023-10-03T01:15:57.017
Modified: 2024-11-21T08:24:29.830
Link: CVE-2023-43627
No data.
OpenCVE Enrichment
No data.
EUVD