{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6575","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-07T12:48:50.931Z","datePublished":"2023-12-07T20:00:05.594Z","dateUpdated":"2024-08-02T08:35:14.569Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-04-09T08:34:33.390Z"},"title":"Byzoro S210 HTTP POST Request repair.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"Byzoro","product":"S210","versions":[{"version":"20231121","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Byzoro S210 up to 20231121. It has been classified as critical. This affects an unknown part of the file /Tool/repair.php of the component HTTP POST Request Handler. The manipulation of the argument txt leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Byzoro S210 bis 20231121 ausgemacht. Sie wurde als kritisch eingestuft. Es betrifft eine unbekannte Funktion der Datei /Tool/repair.php der Komponente HTTP POST Request Handler. Durch das Manipulieren des Arguments txt mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-12-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-12-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-04-09T09:07:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"houdong (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.247155","name":"VDB-247155 | Byzoro S210 HTTP POST Request repair.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.247155","name":"VDB-247155 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.241692","name":"Submit #241692 | There is an RCE vulnerability in the intelligent management plat Baizhuo Networks Smart S210 multi-service security gateway intelligent management platform S210 command execution","tags":["third-party-advisory"]},{"url":"https://github.com/houhuidong/cve/blob/main/rce.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:14.569Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.247155","name":"VDB-247155 | Byzoro S210 HTTP POST Request repair.php sql injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.247155","name":"VDB-247155 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.241692","name":"Submit #241692 | There is an RCE vulnerability in the intelligent management plat Baizhuo Networks Smart S210 multi-service security gateway intelligent management platform S210 command execution","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/houhuidong/cve/blob/main/rce.md","tags":["exploit","x_transferred"]}]}]}}