There is a DLL hijacking vulnerability in ZTE ZXCLOUD iRAI, an attacker could place a fake DLL file in a specific directory and successfully exploit this vulnerability to execute malicious code.
References
| Link | Resource |
|---|---|
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032984 | Vendor Advisory |
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032984 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
28 Jan 2025, 15:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:* |
cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:* cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:* |
21 Nov 2024, 08:21
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.9 |
| References | () https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032984 - Vendor Advisory |
11 Jan 2024, 15:53
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-427 | |
| CPE | cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:* cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:* |
|
| References | () https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032984 - Vendor Advisory | |
| First Time |
Zte zxcloud Irai
Zte Zte zxcloud Irai Firmware |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
05 Jan 2024, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-05 02:15
Updated : 2025-01-28 15:36
NVD link : CVE-2023-41782
Mitre link : CVE-2023-41782
CVE.ORG link : CVE-2023-41782
JSON object : View
Products Affected
zte
- zxcloud_irai
