Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52317 | The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file. |
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2025-06-17T20:59:13.000Z
Reserved: 2023-11-13T13:44:23.702Z
Link: CVE-2023-48248
Updated: 2024-08-02T21:23:39.086Z
Status : Modified
Published: 2024-01-10T11:15:09.867
Modified: 2024-11-21T08:31:18.367
Link: CVE-2023-48248
No data.
OpenCVE Enrichment
No data.
EUVD