CVE-2023-22855
CRITICALKardex Control Center - Code Injection
Title source: ruleDescription
Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.
Exploits (2)
exploitdb
WORKING POC
by Patrick Hener · pythonremotewindows
https://www.exploit-db.com/exploits/51239
References (5)
Scores
CVSS v3
9.8
EPSS
0.6157
EPSS Percentile
98.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-94
Status
published
Products (1)
kardex/kardex_control_center
5.7.12\+0-a203c2a213-master
Published
Feb 15, 2023
Tracked Since
Feb 18, 2026