CVE-2019-11523
CRITICALAnviz Global M3 Outdoor RFID Access Control - Command Injection
Title source: llmDescription
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).
Exploits (1)
nomisec
WORKING POC
2 stars
by wizlab-it · poc
https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc
Scores
CVSS v3
9.8
EPSS
0.0251
EPSS Percentile
85.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-306
CWE-311
Status
published
Products (1)
anviz/m3_firmware
Published
Jun 06, 2019
Tracked Since
Feb 18, 2026