The specific flaw exists within the getMacAddressByIP function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21163.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-23-1878/ |
|
Thu, 26 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Voltronicpower viewpower Pro
|
|
| CPEs | cpe:2.3:a:voltronicpower:viewpower_pro:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Voltronicpower viewpower Pro
|
|
| Metrics |
ssvc
|
Mon, 07 Jul 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Voltronicpower
Voltronicpower viewpower |
|
| CPEs | cpe:2.3:a:voltronicpower:viewpower:2.0-22165:*:*:*:pro:*:*:* | |
| Vendors & Products |
Voltronicpower
Voltronicpower viewpower |
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-27T15:39:48.828Z
Reserved: 2023-12-20T20:38:20.866Z
Link: CVE-2023-51572
Updated: 2024-08-02T22:40:33.448Z
Status : Analyzed
Published: 2024-04-01T22:15:10.277
Modified: 2025-07-07T20:40:34.963
Link: CVE-2023-51572
No data.
OpenCVE Enrichment
No data.