{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T19:31:48.644","vulnerabilities":[{"cve":{"id":"CVE-2023-46306","sourceIdentifier":"cve@mitre.org","published":"2023-10-22T21:15:07.930","lastModified":"2024-11-21T08:28:16.250","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105."},{"lang":"es","value":"La interfaz de administración web en NetModule Router Software (NRSW) 4.6 anterior a 4.6.0.106 y 4.8 anterior a 4.8.0.101 ejecuta un comando del sistema operativo construido con entrada de usuario no sanitizada: metacaracteres de shell en el parámetro /admin/gnssAutoAlign.php device_id. Esto ocurre porque se puede iniciar otro subproceso antes de la captura que activa la función de limpieza. Un exploit exitoso podría permitir a un usuario autenticado ejecutar comandos arbitrarios con privilegios elevados. NOTA: esto es diferente de CVE-2023-0861 y CVE-2023-0862, que se corrigieron en la versión 4.6.0.105."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.7,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*","versionEndExcluding":"4.6.0.105","matchCriteriaId":"0B651903-7598-4F86-B2C1-53923B573509"},{"vulnerable":true,"criteria":"cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7.0.0","versionEndExcluding":"4.7.0.103","matchCriteriaId":"B543F356-8395-4F7E-A3C8-1A5DB362533C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*","matchCriteriaId":"5C90BC32-C405-4178-B944-9CF39C212C46"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*","matchCriteriaId":"A80AE348-C415-4B5F-B359-26E2F2A132F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*","matchCriteriaId":"A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*","matchCriteriaId":"EFF579A1-A31C-47F3-912A-43F5B4894497"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*","matchCriteriaId":"41310FAF-CD23-4126-942D-DA950A96DF3E"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*","matchCriteriaId":"962F7AFA-76A3-4F83-AA2C-AB168C644104"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*","matchCriteriaId":"7120564A-4FE0-403E-A976-9658A665E51A"},{"vulnerable":false,"criteria":"cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*","matchCriteriaId":"0408E588-146F-4AD2-9D58-A12EBA83A697"}]}]}],"references":[{"url":"https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/","source":"cve@mitre.org","tags":["Product","Third Party Advisory"]},{"url":"https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Third Party Advisory"]},{"url":"https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]}]}}]}