Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-35239 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
SolarView Compact SV-CPT-MC310 Hardware solutions / Routers & switches, VoIP, GSM, etc SolarView Compact SV-CPT-MC310F Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Contec |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU65816
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-35239
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the image file management page. A remote user can upload a specially crafted PHP file and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSolarView Compact SV-CPT-MC310: 7.23
SolarView Compact SV-CPT-MC310F: 7.23
External linkshttp://jvn.jp/en/vu/JVNVU93696585/index.html
http://www.contec.com/jp/download/donwload-list/?itemid=b28c8b7c-9f40-40b2-843c-b5b04c035b0e#firmware
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.