BYTEVALUE Intelligent Flow Control Router contains a command injection vulnerability via the /goform/webRead/open endpoint. The `path` parameter is not properly validated and is echoed into a shell context, allowing an attacker to inject and execute arbitrary shell commands on the device. Successful exploitation can lead to writing backdoors, privilege escalation on the host, and full compromise of the router and its management functions. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.
History

Wed, 15 Oct 2025 01:45:00 +0000

Type Values Removed Values Added
Description BYTEVALUE Intelligent Flow Control Router contains a command injection vulnerability via the /goform/webRead/open endpoint. The `path` parameter is not properly validated and is echoed into a shell context, allowing an attacker to inject and execute arbitrary shell commands on the device. Successful exploitation can lead to writing backdoors, privilege escalation on the host, and full compromise of the router and its management functions. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.
Title BYTEVALUE Intelligent Flow Control Router Command Injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-10-15T01:19:38.316Z

Reserved: 2025-10-14T20:19:24.602Z

Link: CVE-2023-7311

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-15T02:15:32.177

Modified: 2025-10-15T02:15:32.177

Link: CVE-2023-7311

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.