PT-2024-13933 · Realtek · Realtek Rtl819X Jungle Sdk
Francesco Benvenuto
·
Published
2024-07-08
·
Updated
2025-09-16
·
CVE-2023-50381
CVSS v3.1
7.2
High
| AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Realtek rtl819x Jungle SDK version 3.4.11
Description
Three os command injection vulnerabilities exist in the boa formWsc functionality. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities. This command injection is related to the
targetAPSsid request's parameter.Recommendations
For Realtek rtl819x Jungle SDK version 3.4.11, consider disabling the boa formWsc functionality until a patch is available. Restrict access to the
targetAPSsid request parameter to minimize the risk of exploitation. Avoid using the targetAPSsid parameter in affected API endpoints until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Realtek Rtl819X Jungle Sdk