目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2024-43653— iocharger 安全漏洞

EPSS 1.89% · P83
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2024-43653の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Authenticated command injection in the <redacted> action leads to full remote code execution as root on the charging station
ソース: NVD (National Vulnerability Database)
脆弱性説明
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability  allows OS Command Injection as root This issue affects Iocharger firmware for AC model chargers before version 24120701. Likelihood: Moderate – The <redacted> binary does not seem to be used by the web interface, so it might be more difficult to find. It seems to be largely the same binary as used by the Iocharger Pedestal charging station, however. The attacker will also need a (low privilege) account to gain access to the <redacted> binary, or convince a user with such access to execute a crafted HTTP request. Impact: Critical – The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and delete files and services. CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads to a full compromised (VC:H/VI:H/VA:H), and compromised devices can be used to pivot into networks that should potentially not be accessible (SC:L/SI:L/SA:H). Becuase this is an EV charger handing significant power, there is a potential safety impact (S:P). This attack can be automated (AU:Y).
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
iocharger 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
iocharger是中国银河樟坛(iocharger)公司的一个电动汽车充电和智能能源管理解决方案。 iocharger 24120701之前版本存在安全漏洞,该漏洞源于命令中使用的特殊元素不当中和,允许以root身份进行操作系命令注入。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
IochargerIocharger firmware for AC models 0 ~ 24120701 -

II. CVE-2024-43653の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2024-43653のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Iocharger · 2025-01-09 · 16 CVEs total

CVE-2024-43658Using the <redacted> action or <redacted>.sh script, arbitrary files and directories can b
CVE-2024-43661Buffer overflow in <redacted>.so leads to DoS of OCPP service
CVE-2024-43654Authenticated command injection in the <redacted> action leads to full remote code executi
CVE-2024-43655Any authenticated users can execute OS commands as root using the <redacted>.sh CGI script
CVE-2024-43648Authenticated command injection via <redacted>.exe <redacted> parameter
CVE-2024-43657When uploading new firmware, a shell script inside a firmware file is executed during its
CVE-2024-43662Authenticated arbitrary file upload to /tmp/ and /tmp/upload/
CVE-2024-43656A backup can be manipulated and then restored to create arbitrary files inside the <redact
CVE-2024-43663Buffer overflow vulnerabilities in CGI scripts lead to segfault
CVE-2024-43652Authenticated command injection in the <redacted> action leads to full remote code executi
CVE-2024-43650Authenticated command injection in the <redacted> action leads to full remote code executi
CVE-2024-43649Authenticated command injection via <redacted>.exe <redacted> parameter
CVE-2024-43659Plaintext default credentials in firmware
CVE-2024-43651Authenticated command injection in the <redacted> action leads to full remote code executi
CVE-2024-43660Arbitrary file download using <redacted>.sh

IV. 関連脆弱性

V. CVE-2024-43653へのコメント

まだコメントはありません


コメントを残す