The vulnerability allows a remote attacker to upload arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request.
By abusing this vulnerability, it is possible to obtain remote code execution (RCE) with root privileges on the device.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: bosch
Published:
Updated: 2024-08-02T21:23:39.206Z
Reserved: 2023-11-13T13:44:23.702Z
Link: CVE-2023-48243

No data.

Status : Modified
Published: 2024-01-10T11:15:08.777
Modified: 2024-11-21T08:31:17.553
Link: CVE-2023-48243

No data.