PT-2024-13933 · Realtek · Realtek Rtl819X Jungle Sdk

Francesco Benvenuto

·

Published

2024-07-08

·

Updated

2025-09-15

·

CVE-2023-50381

CVSS v3.1
7.2
VectorAV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Realtek rtl819x Jungle SDK version 3.4.11

Description:

Three os command injection vulnerabilities exist in the boa formWsc functionality. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities. This command injection is related to the `targetAPSsid` request's parameter.

Recommendations:

For Realtek rtl819x Jungle SDK version 3.4.11, consider disabling the boa formWsc functionality until a patch is available. Restrict access to the `targetAPSsid` request parameter to minimize the risk of exploitation. Avoid using the `targetAPSsid` parameter in affected API endpoints until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2023-50381

Affected Products

Realtek Rtl819X Jungle Sdk