Command Injection Vulnerability in Netis N3Mv2 Wake-On-LAN Function
CVE-2023-43893

9.8CRITICAL

Key Information:

Vendor
CVE Published:
2 October 2023

What is CVE-2023-43893?

The Netis N3Mv2 router version V1.0.1.865 has been found to be susceptible to a command injection vulnerability via the 'wakeup_mac' parameter utilized within its Wake-On-LAN (WoL) functionality. An attacker can exploit this weakness by sending carefully crafted payloads, potentially allowing for unauthorized command execution on the device. This security flaw underscores the importance of robust input validation and highlights the need for immediate remediation.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-43893 : Command Injection Vulnerability in Netis N3Mv2 Wake-On-LAN Function