{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1097","assignerOrgId":"084566ad-deee-4e89-acff-6b7b1bf9d4b7","state":"PUBLISHED","assignerShortName":"Baicells","dateReserved":"2023-02-28T17:35:19.554Z","datePublished":"2023-03-01T19:29:26.456Z","dateUpdated":"2025-03-07T15:53:21.691Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["BCE"],"product":"EG7035-M11","vendor":"Baicells","versions":[{"changes":[{"at":"BaiCE_BM_2.5.26","status":"unaffected"}],"lessThanOrEqual":" BCE-ODU-1.0.8","status":"affected","version":"0","versionType":"patch"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"CPE would need to be configured and running on  BCE-ODU-1.0.8 firmware and older along with being accessible on the internal network or public network. If the Web interface is enabled it will allow users to exploit using the above method. "}],"value":"CPE would need to be configured and running on  BCE-ODU-1.0.8 firmware and older along with being accessible on the internal network or public network. If the Web interface is enabled it will allow users to exploit using the above method. "}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Lionel Musonza"},{"lang":"en","type":"remediation developer","user":"00000000-0000-4000-9000-000000000000","value":"Baicells Security Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><span style=\"background-color: rgb(255, 255, 255);\">Baicells EG7035-M11 devices with firmware through  BCE-ODU-1.0.8 are vulnerable to improper code exploitation via HTTP GET command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods have been tested and validated by a 3rd party analyst and have been confirmed exploitable special thanks to Lionel Musonza for the discovery.<br></span><br><br></p><br>"}],"value":"Baicells EG7035-M11 devices with firmware through  BCE-ODU-1.0.8 are vulnerable to improper code exploitation via HTTP GET command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods have been tested and validated by a 3rd party analyst and have been confirmed exploitable special thanks to Lionel Musonza for the discovery.\n\n\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-108","descriptions":[{"lang":"en","value":"CAPEC-108 Command Line Execution through SQL Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":" CWE-94: Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"084566ad-deee-4e89-acff-6b7b1bf9d4b7","shortName":"Baicells","dateUpdated":"2023-03-01T19:29:26.456Z"},"references":[{"tags":["patch","release-notes"],"url":"https://community.na.baicells.com/t/baice-bm-2-5-26-new-cpe-software-has-been-released/1756"},{"tags":["patch"],"url":"https://img.baicells.com//Upload/20220524/FILE/BaiCE_BM_2.5.26_NA.bin.bin"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Baicells recommends that all customers currently running an earlier version of BCE-ODU-1.0.8 upgrade&nbsp;their product to the BaiCE_BM_2.5.26&nbsp;firmware.</p><br>"}],"value":"Baicells recommends that all customers currently running an earlier version of BCE-ODU-1.0.8 upgrade their product to the BaiCE_BM_2.5.26 firmware.\n\n\n"}],"source":{"discovery":"UNKNOWN"},"title":"Unauthenticated Command Injection EG7035-M11 Series","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:32:46.398Z"},"title":"CVE Program Container","references":[{"tags":["patch","release-notes","x_transferred"],"url":"https://community.na.baicells.com/t/baice-bm-2-5-26-new-cpe-software-has-been-released/1756"},{"tags":["patch","x_transferred"],"url":"https://img.baicells.com//Upload/20220524/FILE/BaiCE_BM_2.5.26_NA.bin.bin"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-07T15:53:08.611371Z","id":"CVE-2023-1097","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-07T15:53:21.691Z"}}]}}