CVE-2023-45852
CRITICAL EXPLOITED NUCLEIViessmann Vitogate 300 Firmware < 2.1.3.0 - Command Injection
Title source: ruleDescription
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.
Nuclei Templates (1)
Viessmann Vitogate 300 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:"Vitogate 300" || http.title:"vitogate 300"
FOFA:
title="Vitogate 300" || title="vitogate 300"
Scores
CVSS v3
9.8
EPSS
0.9359
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-12-04
CWE
CWE-77
Status
published
Products (1)
viessmann/vitogate_300_firmware
< 2.1.3.0
Published
Oct 14, 2023
Tracked Since
Feb 18, 2026