Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53256 | Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly. |
Fri, 20 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-06-20T16:40:13.313Z
Reserved: 2023-11-24T11:53:46.294Z
Link: CVE-2023-49254
Updated: 2024-08-02T21:53:44.880Z
Status : Modified
Published: 2024-01-12T15:15:09.017
Modified: 2025-06-20T17:15:32.833
Link: CVE-2023-49254
No data.
OpenCVE Enrichment
No data.
EUVD