Incorrect access control in the firewall management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter local firewall settings of the device as if they were the administrator via HTTP POST request.
References
Link | Resource |
---|---|
https://github.com/setersora/pe6208 | Exploit Third Party Advisory |
https://github.com/setersora/pe6208 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
30 May 2025, 16:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:aten:pe6208_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:aten:pe6208:-:*:*:*:*:*:*:* |
|
First Time |
Aten pe6208
Aten Aten pe6208 Firmware |
|
References | () https://github.com/setersora/pe6208 - Exploit, Third Party Advisory |
Information
Published : 2024-05-28 19:15
Updated : 2025-05-30 16:25
NVD link : CVE-2023-43848
Mitre link : CVE-2023-43848
CVE.ORG link : CVE-2023-43848
JSON object : View
Products Affected
aten
- pe6208
- pe6208_firmware
CWE
CWE-284
Improper Access Control