Command Injection Vulnerability in Netis N3Mv2 Wake-On-LAN Function
CVE-2023-43893
9.8CRITICAL
What is CVE-2023-43893?
The Netis N3Mv2 router version V1.0.1.865 has been found to be susceptible to a command injection vulnerability via the 'wakeup_mac' parameter utilized within its Wake-On-LAN (WoL) functionality. An attacker can exploit this weakness by sending carefully crafted payloads, potentially allowing for unauthorized command execution on the device. This security flaw underscores the importance of robust input validation and highlights the need for immediate remediation.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved