An incorrect access control issue was discovered in Interlink PSG-5124 version 1.0.4, allows attackers to execute arbitrary code via crafted GET request.
References
Link | Resource |
---|---|
https://github.com/shellpei/LINK-Unauthorized/blob/main/CVE-2023-29711 | Exploit Third Party Advisory |
https://holistic-height-e6d.notion.site/LINK-PSG-5124-Switch-remote-command-vulnerability-da4fd8fb450d42879b07ef3a953a2366 | Exploit Third Party Advisory |
https://github.com/shellpei/LINK-Unauthorized/blob/main/CVE-2023-29711 | Exploit Third Party Advisory |
https://holistic-height-e6d.notion.site/LINK-PSG-5124-Switch-remote-command-vulnerability-da4fd8fb450d42879b07ef3a953a2366 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Dec 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-346 |
Information
Published : 2023-06-22 12:15
Updated : 2024-12-12 19:15
NVD link : CVE-2023-29711
Mitre link : CVE-2023-29711
CVE.ORG link : CVE-2023-29711
JSON object : View
Products Affected
interlink
- psg-5124
- psg-5124_firmware
CWE