A command injection vulnerability exists in the com.webos.service.connectionmanager/tv/setVlanStaticAddress endpoint on webOS versions 5 and 6. A series of specially crafted requests can lead to command execution as the dbus user. An attacker can make authenticated requests to trigger this vulnerability.
Full versions and TV models affected:
* webOS 5.5.0 - 04.50.51 running on OLED55CXPUAÂ
* webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB
References
| Link | Resource |
|---|---|
| https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/ | Exploit Third Party Advisory |
| https://lgsecurity.lge.com/bulletins/tv#updateDetails | Vendor Advisory |
| https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/ | Exploit Third Party Advisory |
| https://lgsecurity.lge.com/bulletins/tv#updateDetails | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-04-09 14:15
Updated : 2025-02-07 18:15
NVD link : CVE-2023-6320
Mitre link : CVE-2023-6320
CVE.ORG link : CVE-2023-6320
JSON object : View
Products Affected
lg
- oled48c1pub
- webos
- oled55cxpua
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
