← Voltar para CVEs
CVE-2023-7311
N/ADescricao
BYTEVALUE Intelligent Flow Control Router contains a command injection vulnerability via the /goform/webRead/open endpoint. The `path` parameter is not properly validated and is echoed into a shell context, allowing an attacker to inject and execute arbitrary shell commands on the device. Successful exploitation can lead to writing backdoors, privilege escalation on the host, and full compromise of the router and its management functions. VulnCheck has observed this vulnerability being targeted by the RondoDox botnet campaign.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado10/15/2025
Ultima modificacao10/16/2025
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-78
Referencias
https://blog.csdn.net/zkaqlaoniao/article/details/134328873(disclosure@vulncheck.com)
https://github.com/adysec/nuclei_poc/blob/49c283b2bbb244c071786a2b768fbdde1b91f38e/poc/web/bytevalue_goform_webread_open_rce.yaml(disclosure@vulncheck.com)
https://isc.sans.edu/diary/Exploit+against+Unnamed+Bytevalue+router+vulnerability+included+in+Mirai+Bot/30642(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/bytevalue-intelligent-flow-control-router-command-injection(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.