{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-26317","assignerOrgId":"b57733aa-7326-4f07-8e09-0be8e0df1909","assignerShortName":"Xiaomi","dateUpdated":"2024-10-16T20:07:44.750Z","dateReserved":"2023-02-22T00:00:00.000Z","datePublished":"2023-08-02T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Xiaomi router","vendor":"Xiaomi","versions":[{"changes":[{"at":"2023.4","status":"unaffected"}],"lessThanOrEqual":"2023.2","status":"affected","version":"Xiaomi Router Firmware version before 2023.2","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><span style=\"background-color: rgb(245, 247, 249);\">Xiaomi routers have an external interface that can lead to command injection. The vulnerability is caused by lax filtering of responses from external interfaces. Attackers can exploit this vulnerability to gain access to the router by hijacking the ISP or upper-layer routing.</span><br></p>"}],"value":"Xiaomi routers have an external interface that can lead to command injection. The vulnerability is caused by lax filtering of responses from external interfaces. Attackers can exploit this vulnerability to gain access to the router by hijacking the ISP or upper-layer routing."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b57733aa-7326-4f07-8e09-0be8e0df1909","shortName":"Xiaomi","dateUpdated":"2024-10-08T09:44:23.934Z"},"references":[{"url":"https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=529"}],"source":{"discovery":"UNKNOWN"},"title":"Xiaomi router external request interface has command injection","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:46:23.915Z"},"title":"CVE Program Container","references":[{"url":"https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=529","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-16T19:56:08.393776Z","id":"CVE-2023-26317","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-16T20:07:44.750Z"}}]}}