CVE-2023-6321

A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-05-15 13:15

Updated : 2025-02-11 21:32


NVD link : CVE-2023-6321

Mitre link : CVE-2023-6321

CVE.ORG link : CVE-2023-6321


JSON object : View

Products Affected

owletcare

  • cam_2
  • cam_firmware
  • cam
  • cam_2_firmware

throughtek

  • kalay_platform
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')