vendor:
Power Control Software
by:
Ahmed Alroky
9.8
CVSS
CRITICAL
OS command injection
78
CWE
Product Name: Power Control Software
Affected Version From: C1.2.5
Affected Version To: C1.2.5
Patch Exists: YES
Related CWE: CVE-2023-28343
CPE: apsystems.com
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=148461, https://www.infosecmatter.com/nessus-plugin-library/?id=148486, https://www.infosecmatter.com/nessus-plugin-library/?id=148466, https://www.infosecmatter.com/nessus-plugin-library/?id=148477, https://www.infosecmatter.com/nessus-plugin-library/?id=31605
Tags: cve,cve2023,oast,altenergy,iot,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'google-query': 'intitle:"Altenergy Power Control Software"', 'shodan-query': 'title:"Altenergy Power Control Software"', 'vendor': 'apsystems', 'product': 'energy_communication_unit_firmware'}
Platforms Tested: Windows 10
2023
Altenergy Power Control Software C1.2.5 – OS command injection
Altenergy Power Control Software C1.2.5 is vulnerable to OS command injection. An attacker can exploit this vulnerability by sending a maliciously crafted request to the target server. This can allow the attacker to execute arbitrary commands on the target system.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update their systems to the latest version of the software.