Description
The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
Published: 2023-10-22
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-50528 The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.
History

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:netmodule:netmodule_router_software:4.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:netmodule:netmodule_router_software:4.8:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Netmodule Nb1601 Nb1800 Nb1810 Nb2800 Nb2810 Nb3701 Nb3800 Netmodule Router Software Ng800
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-12T18:22:55.873Z

Reserved: 2023-10-22T00:00:00.000Z

Link: CVE-2023-46306

cve-icon Vulnrichment

Updated: 2024-08-02T20:45:40.734Z

cve-icon NVD

Status : Modified

Published: 2023-10-22T21:15:07.930

Modified: 2024-11-21T08:28:16.250

Link: CVE-2023-46306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses