PT-2024-13933 · Realtek · Realtek Rtl819X Jungle Sdk

Francesco Benvenuto

·

Published

2024-07-08

·

Updated

2025-09-16

·

CVE-2023-50381

CVSS v3.1

7.2

High

AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Realtek rtl819x Jungle SDK version 3.4.11
Description Three os command injection vulnerabilities exist in the boa formWsc functionality. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities. This command injection is related to the targetAPSsid request's parameter.
Recommendations For Realtek rtl819x Jungle SDK version 3.4.11, consider disabling the boa formWsc functionality until a patch is available. Restrict access to the targetAPSsid request parameter to minimize the risk of exploitation. Avoid using the targetAPSsid parameter in affected API endpoints until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2023-50381

Affected Products

Realtek Rtl819X Jungle Sdk