Vulnerability Details : CVE-2023-34724
An issue was discovered in TECHView LA5570 Wireless Gateway 1.0.19_T53, allows physical attackers to gain escalated privileges via the UART interface.
Products affected by CVE-2023-34724
- cpe:2.3:o:jaycar:la5570_firmware:1.0.19_t53:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-34724
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-34724
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
NIST |
CWE ids for CVE-2023-34724
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-34724
-
https://www.jaycar.com.au/wireless-gateway-home-automation-controller/p/LA5570
Wireless Gateway Home Automation Controller | Jaycar ElectronicsProduct
-
http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
TECHView LA5570 Wireless Gateway 1.0.19_T53 Traversal / Privilege Escalation ≈ Packet Storm
-
https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
CVE-2023-34723, CVE-2023-34724, CVE-2023-34725Exploit;Third Party Advisory
Jump to