BYTEVALUE Intelligent Flow Control Router contains a command injection vulnerability via the /goform/webRead/open endpoint. The `path` parameter is not properly validated and is echoed into a shell context, allowing an attacker to inject and execute arbitrary shell commands on the device. Successful exploitation can lead to writing backdoors, privilege escalation on the host, and full compromise of the router and its management functions. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Oct 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | BYTEVALUE Intelligent Flow Control Router contains a command injection vulnerability via the /goform/webRead/open endpoint. The `path` parameter is not properly validated and is echoed into a shell context, allowing an attacker to inject and execute arbitrary shell commands on the device. Successful exploitation can lead to writing backdoors, privilege escalation on the host, and full compromise of the router and its management functions. VulnCheck has observed this vulnerability being targeted by the Rondo botnet. | |
Title | BYTEVALUE Intelligent Flow Control Router Command Injection | |
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-15T01:19:38.316Z
Reserved: 2025-10-14T20:19:24.602Z
Link: CVE-2023-7311

No data.

Status : Received
Published: 2025-10-15T02:15:32.177
Modified: 2025-10-15T02:15:32.177
Link: CVE-2023-7311

No data.

No data.