PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word. The attacker must have shell access to the device in order to exploit this vulnerability.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://ppn.paxengine.com/release/development | vendor advisory permissions required |
https://blog.stmcyber.com/pax-pos-cves-2023/ | third party advisory exploit technical description |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | third party advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | third party advisory |