Логотип exploitDog
bind:CVE-2023-34356
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-34356

Количество 2

Количество 2

nvd логотип

CVE-2023-34356

больше 2 лет назад

An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-p5qp-xrxv-c8wv

больше 2 лет назад

An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-34356

An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVSS3: 7.2
0%
Низкий
больше 2 лет назад
github логотип
GHSA-p5qp-xrxv-c8wv

An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVSS3: 7.2
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу