CVE-2023-31465
CRITICAL EXPLOITED NUCLEIFSMLabs TimeKeeper <8.0.28 - Command Injection
Title source: llmDescription
An issue was discovered in FSMLabs TimeKeeper 8.0.17 through 8.0.28. By intercepting requests from various timekeeper streams, it is possible to find the getsamplebacklog call. Some query parameters are passed directly in the URL and named arg[x], with x an integer starting from 1; it is possible to modify arg[2] to insert Bash code that will be executed directly by the server.
Nuclei Templates (1)
TimeKeeper by FSMLabs - Remote Code Execution
CRITICALby ritikchaddha
Shodan:
http.favicon.hash:2134367771
FOFA:
icon_hash=2134367771
Scores
CVSS v3
9.8
EPSS
0.9054
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-12-04
Status
published
Products (1)
fsmlabs/timekeeper
8.0.17 - 8.0.28
Published
Jul 26, 2023
Tracked Since
Feb 18, 2026