Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-5222
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Viessmann Vitogate 300 Web Management Interface vitogate.cgi isValidUser hard-coded password
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用硬编码的口令
Source: NVD (National Vulnerability Database)
Vulnerability Title
Viessmann Vitogate 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Viessmann Vitogate是Viessmann公司的一个智能化控制系统。 Viessmann Vitogate 存在安全漏洞,该漏洞源于组件Web管理界面中的/cgi-bin/vitogate.cgi中的isValidUser函数使用硬编码密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
ViessmannVitogate 300 2.1.0 -
II. Public POCs for CVE-2023-5222
#POC DescriptionSource LinkShenlong Link
1A critical vulnerability in Viessmann Vitogate 300 up to 2.1.3.0 allows attackers to authenticate using hardcoded credentials in the Web Management Interface. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-5222.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-5222
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-5222

No comments yet


Leave a comment