ID

VAR-202312-1778


CVE

CVE-2023-50989


TITLE

Tenda i29 pingSet method command execution vulnerability

Trust: 0.6

sources: CNVD: CNVD-2024-06246

DESCRIPTION

Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the pingSet function. Tenda i29 is a wireless router made by China Tenda Company. This vulnerability is caused by the failure of the pingSet method to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution

Trust: 1.44

sources: NVD: CVE-2023-50989 // CNVD: CNVD-2024-06246

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-06246

AFFECTED PRODUCTS

vendor:tendamodel:i29scope:eqversion:1.0.0.2

Trust: 1.0

vendor:tendamodel:i29scope:eqversion:1.0.0.5

Trust: 1.0

vendor:tendamodel:i29scope:eqversion:v1.0.0.5

Trust: 0.6

vendor:tendamodel:i29scope:eqversion:v1.0.0.2

Trust: 0.6

sources: CNVD: CNVD-2024-06246 // NVD: CVE-2023-50989

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-50989
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2024-06246
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-06246
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-50989
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2024-06246 // NVD: CVE-2023-50989

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

sources: NVD: CVE-2023-50989

PATCH

title:Patch for Tenda i29 pingSet method command execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/521231

Trust: 0.6

sources: CNVD: CNVD-2024-06246

EXTERNAL IDS

db:NVDid:CVE-2023-50989

Trust: 1.6

db:CNVDid:CNVD-2024-06246

Trust: 0.6

sources: CNVD: CNVD-2024-06246 // NVD: CVE-2023-50989

REFERENCES

url:http://tenda.com

Trust: 1.0

url:https://github.com/ef4tless/vuln/blob/master/iot/i29/pingset-2.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2023-50989

Trust: 0.6

sources: CNVD: CNVD-2024-06246 // NVD: CVE-2023-50989

SOURCES

db:CNVDid:CNVD-2024-06246
db:NVDid:CVE-2023-50989

LAST UPDATE DATE

2024-08-14T14:16:48.601000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-06246date:2024-01-29T00:00:00
db:NVDid:CVE-2023-50989date:2023-12-22T20:28:42.697

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-06246date:2024-01-25T00:00:00
db:NVDid:CVE-2023-50989date:2023-12-20T22:15:35.170