Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52326 | The vulnerability allows a remote attacker to access sensitive data inside exported packages or obtain up to Remote Code Execution (RCE) with root privileges on the device. The vulnerability can be exploited directly by authenticated users, via crafted HTTP requests, or indirectly by unauthenticated users, by accessing already-exported backup packages, or crafting an import package and inducing an authenticated victim into sending the HTTP upload request. |
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2025-06-17T20:59:14.230Z
Reserved: 2023-11-13T13:44:23.705Z
Link: CVE-2023-48257
Updated: 2024-08-02T21:23:39.464Z
Status : Modified
Published: 2024-01-10T13:15:46.590
Modified: 2024-11-21T08:31:20.490
Link: CVE-2023-48257
No data.
OpenCVE Enrichment
No data.
EUVD