Description
In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local code execution at the root level.
References (2)
Core 2
Core References
Product
http://kramerav.com
Exploit, Third Party Advisory
https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2023-33469
Scores
CVSS v3
7.8
EPSS
0.0009
EPSS Percentile
25.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-94
Status
published
Products (2)
kramerav/via_connect2_firmware
< 4.0.1.1326
kramerav/via_go2_firmware
< 4.0.1.1326
Published
Aug 09, 2023
Tracked Since
Feb 18, 2026