8.8
CVSSv3

CVE-2022-40282

Published: 25/11/2022 Updated: 01/12/2022
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8

Vulnerability Summary

The web server of Hirschmann BAT-C2 prior to 09.13.01.00R04 allows authenticated command injection. This allows an authenticated malicious user to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.

Most Upvoted Vulmon Research Post

Advisory can be found at our website. (https://cyberdanube.com/en/en-authenticated-command-injection-in-hirschmann-belden-bat-c2/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

belden hirschmann_bat-c2_firmware

Mailing Lists

Hirschmann (Belden) BAT-C2 version 8810R8 suffers from a remote authenticated command injection vulnerability ...

Github Repositories

CVE-2022-40282 The web server of Hirschmann BAT-C2 before 09130100R04 allows authenticated command injection This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized The vendor's ID is BSECV-2022-21 authentication complexity vector not available no