CVE-2023-51584

Voltronic Power ViewPower USBCommEx shutdown Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. User interaction is required to exploit this vulnerability in that an administrator must trigger a shutdown operation. The specific flaw exists within the shutdown method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22065.
Configurations

Configuration 1 (hide)

cpe:2.3:a:voltronicpower:viewpower:1.04.21353:*:*:*:-:*:*:*

History

09 Jul 2025, 16:59

Type Values Removed Values Added
CPE cpe:2.3:a:voltronicpower:viewpower:1.04.21353:*:*:*:-:*:*:*
First Time Voltronicpower
Voltronicpower viewpower
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1889/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1889/ - Third Party Advisory

Information

Published : 2024-05-03 03:16

Updated : 2025-07-09 16:59


NVD link : CVE-2023-51584

Mitre link : CVE-2023-51584

CVE.ORG link : CVE-2023-51584


JSON object : View

Products Affected

voltronicpower

  • viewpower
CWE
CWE-749

Exposed Dangerous Method or Function