Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-1097 : Vulnerability Insights and Analysis

CVE-2023-1097 affects Baicells EG7035-M11 devices with BCE-ODU-1.0.8 firmware, enabling unauthorized code execution via HTTP GET injections. Learn about the impact, mitigation, and patching strategies here.

This CVE-2023-1097 affects Baicells devices in the EG7035-M11 series with firmware through BCE-ODU-1.0.8. The vulnerability allows for improper code exploitation via HTTP GET command injections, enabling unauthorized execution of commands with root permissions.

Understanding CVE-2023-1097

Baicells EG7035-M11 devices are vulnerable to unauthorized code execution due to HTTP GET command injections in firmware versions up to BCE-ODU-1.0.8.

What is CVE-2023-1097?

Baicells EG7035-M11 devices with firmware through BCE-ODU-1.0.8 are susceptible to improper code exploitation through HTTP GET command injections. Commands can be executed before login and with root permissions, posing a critical security risk.

The Impact of CVE-2023-1097

The vulnerability, assigned CAPEC-108, allows for command line execution through SQL injection, potentially leading to data breaches, system compromise, and unauthorized access to sensitive information.

Technical Details of CVE-2023-1097

This vulnerability has a CVSSv3.1 base score of 9.3, with high impact on availability, confidentiality, and integrity. The attack complexity is low, requiring no user interaction and affecting the local system.

Vulnerability Description

Baicells EG7035-M11 devices with BCE-ODU-1.0.8 firmware are susceptible to improper code exploitation through HTTP GET command injections, allowing unauthorized command execution with elevated privileges.

Affected Systems and Versions

        Affected Product: Baicells EG7035-M11
        Vulnerable Firmware: Through BCE-ODU-1.0.8

Exploitation Mechanism

Exploitation of this vulnerability requires the device to be running on BCE-ODU-1.0.8 or older firmware, accessible on the internal or public network, and with the Web interface enabled.

Mitigation and Prevention

It is crucial to take immediate action to mitigate the risks associated with CVE-2023-1097 and prevent potential unauthorized access and data breaches.

Immediate Steps to Take

Baicells recommends that all users running earlier versions of BCE-ODU-1.0.8 upgrade their firmware to BaiCE_BM_2.5.26 to patch the vulnerability and enhance system security.

Long-Term Security Practices

Regularly update firmware and apply security patches provided by Baicells to address known vulnerabilities and enhance system resilience against evolving cyber threats.

Patching and Updates

Users should refer to Baicells' official release notes and download the BaiCE_BM_2.5.26 firmware update to protect their EG7035-M11 devices from unauthorized command injections.

Remember to keep your Baicells devices updated with the latest firmware versions to stay protected against potential security threats.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now