Voltronic Power ViewPower USBCommEx shutdown Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. User interaction is required to exploit this vulnerability in that an administrator must trigger a shutdown operation.
The specific flaw exists within the shutdown method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22065.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1889/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-1889/ | Third Party Advisory |
Configurations
History
09 Jul 2025, 16:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:voltronicpower:viewpower:1.04.21353:*:*:*:-:*:*:* | |
First Time |
Voltronicpower
Voltronicpower viewpower |
|
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-1889/ - Third Party Advisory |
Information
Published : 2024-05-03 03:16
Updated : 2025-07-09 16:59
NVD link : CVE-2023-51584
Mitre link : CVE-2023-51584
CVE.ORG link : CVE-2023-51584
JSON object : View
Products Affected
voltronicpower
- viewpower
CWE
CWE-749
Exposed Dangerous Method or Function