ID

VAR-202312-2150


CVE

CVE-2023-50983


TITLE

Tenda i29 sysScheduleRebootSet method command execution vulnerability

Trust: 0.6

sources: CNVD: CNVD-2024-06250

DESCRIPTION

Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the sysScheduleRebootSet function. Tenda i29 is a wireless router made by China Tenda Company. The vulnerability is caused by the failure of the sysScheduleRebootSet method to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution

Trust: 1.44

sources: NVD: CVE-2023-50983 // CNVD: CNVD-2024-06250

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-06250

AFFECTED PRODUCTS

vendor:tendamodel:i29scope:eqversion:1.0.0.2

Trust: 1.0

vendor:tendamodel:i29scope:eqversion:1.0.0.5

Trust: 1.0

vendor:tendamodel:i29scope:eqversion:v1.0.0.5

Trust: 0.6

vendor:tendamodel:i29scope:eqversion:v1.0.0.2

Trust: 0.6

sources: CNVD: CNVD-2024-06250 // NVD: CVE-2023-50983

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-50983
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2024-06250
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-06250
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-50983
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2024-06250 // NVD: CVE-2023-50983

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

sources: NVD: CVE-2023-50983

PATCH

title:Patch for Tenda i29 sysScheduleRebootSet method command execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/521251

Trust: 0.6

sources: CNVD: CNVD-2024-06250

EXTERNAL IDS

db:NVDid:CVE-2023-50983

Trust: 1.6

db:CNVDid:CNVD-2024-06250

Trust: 0.6

sources: CNVD: CNVD-2024-06250 // NVD: CVE-2023-50983

REFERENCES

url:http://tenda.com

Trust: 1.0

url:https://github.com/ef4tless/vuln/blob/master/iot/i29/sysschedulerebootset-2.md

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2023-50983

Trust: 0.6

sources: CNVD: CNVD-2024-06250 // NVD: CVE-2023-50983

SOURCES

db:CNVDid:CNVD-2024-06250
db:NVDid:CVE-2023-50983

LAST UPDATE DATE

2024-08-14T13:41:21.229000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-06250date:2024-01-29T00:00:00
db:NVDid:CVE-2023-50983date:2023-12-22T20:27:55.097

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-06250date:2024-01-25T00:00:00
db:NVDid:CVE-2023-50983date:2023-12-20T22:15:34.610