Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-29118 β€” AI Deep Analysis Summary

CVSS 9.6 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Enel X Waybox 3.0 has a critical flaw in its Web Admin App. Attackers can send arbitrary SQL requests via `/admin/versions.php`. πŸ“‰ **Consequences**: Full compromise of the internal database.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **SQL Injection (SQLi)**. Specifically mapped to **CWE-89**. The application fails to sanitize inputs in the `versions.php` endpoint, allowing direct manipulation of the backend database.

Q3Who is affected? (Versions/Components)

🏠 **Affected Product**: Enel X **Waybox 3.0** (Home Charging Station). πŸ“¦ **Component**: The internal Web Management Application. ⚠️ **Vendor**: Enel X.…

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Since it's SQLi, hackers can: πŸ”“ **Read** all internal data. πŸ—‘οΈ **Delete/Modify** records. πŸ’₯ **Execute** administrative commands on the DB.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Exploitation Threshold**: **LOW**. πŸ“‘ **Access**: Network Adjacent (AV:A). πŸ”’ **Auth**: None required (PR:N). πŸ‘οΈ **UI**: None required (UI:N). 🎯 **Complexity**: Low (AC:L).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: The provided data shows `pocs: []`, meaning **no specific PoC code** is listed in this dataset. 🌍 **However**, SQLi is a well-known technique.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan your network for Enel X Waybox devices. πŸ•΅οΈβ€β™‚οΈ **Test**: Attempt to access `/admin/versions.php`. πŸ§ͺ **Verify**: If the endpoint is reachable without auth, it is vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: Yes. Enel X released a **Security Bulletin (06-2024-V1)**. πŸ“„ **Reference**: Check the official Enel X support documentation for firmware updates or patches addressing the `versions.php` endpoint.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Isolate**: Block access to the device's admin interface via Firewall. 2. **Disable**: Turn off the Web Admin feature if possible. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. With a CVSS of 10.0 and no authentication required, this is an immediate threat. Patch or isolate these devices **NOW**.