CVE-2023-51593

Voltronic Power ViewPower Pro Expression Language Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Struts2 dependency. The issue results from the use of a library that is vulnerable to expression language injection. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22095.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:voltronicpower:viewpower:2.0-22165:*:*:*:pro:*:*:*

History

09 Jul 2025, 16:57

Type Values Removed Values Added
CPE cpe:2.3:a:voltronicpower:viewpower:2.0-22165:*:*:*:pro:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1896/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1896/ - Third Party Advisory
First Time Voltronicpower
Voltronicpower viewpower

03 May 2024, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:16

Updated : 2025-07-09 16:57


NVD link : CVE-2023-51593

Mitre link : CVE-2023-51593


JSON object : View

Products Affected

voltronicpower

  • viewpower
CWE

No CWE.