A command injection vulnerability exists in the getAudioMetadata method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.
* webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA
* webOS 5.5.0 - 04.50.51 running on OLED55CXPUA
* webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB
* webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lg
Lg lg43um7000pla Lg oled48c1pub Lg oled55a23la Lg oled55cxpua Lg webos |
|
CPEs | cpe:2.3:h:lg:lg43um7000pla:-:*:*:*:*:*:*:* cpe:2.3:h:lg:oled48c1pub:-:*:*:*:*:*:*:* cpe:2.3:h:lg:oled55a23la:-:*:*:*:*:*:*:* cpe:2.3:h:lg:oled55cxpua:-:*:*:*:*:*:*:* cpe:2.3:o:lg:webos:4.9.7:*:*:*:*:*:*:* cpe:2.3:o:lg:webos:5.5.0:*:*:*:*:*:*:* cpe:2.3:o:lg:webos:6.3.3-442:*:*:*:*:*:*:* cpe:2.3:o:lg:webos:7.3.1-43:*:*:*:*:*:*:* |
|
Vendors & Products |
Lg
Lg lg43um7000pla Lg oled48c1pub Lg oled55a23la Lg oled55cxpua Lg webos |

Status: PUBLISHED
Assigner: Bitdefender
Published:
Updated: 2024-08-02T08:28:21.212Z
Reserved: 2023-11-27T14:21:55.241Z
Link: CVE-2023-6319

Updated: 2024-08-02T08:28:21.212Z

Status : Analyzed
Published: 2024-04-09T14:15:08.093
Modified: 2025-02-07T18:20:04.673
Link: CVE-2023-6319

No data.