Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-52163: n/a

0
High
VulnerabilityCVE-2023-52163cvecve-2023-52163
Published: Mon Feb 03 2025 (02/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 12/22/2025, 22:41:46 UTC

Technical Analysis

CVE-2023-52163 is a command injection vulnerability identified in Digiever DS-2105 Pro devices running firmware version 3.1.0.71-11. The vulnerability resides in the time_tzsetup.cgi web interface endpoint, which handles time zone setup configurations. An attacker with low-level privileges (PR:L) can remotely exploit this flaw over the network (AV:N) without requiring user interaction (UI:N). The vulnerability allows execution of arbitrary system commands, leading to full compromise of the device's confidentiality, integrity, and availability (C:H/I:H/A:H). The weakness is categorized under CWE-862, indicating improper authorization checks that enable privilege escalation or unauthorized command execution. Importantly, the affected products are no longer supported by the vendor, and no patches or updates are available to remediate the issue. Although no exploits have been observed in the wild, the high CVSS score of 8.8 reflects the critical nature of this vulnerability. The exploitability is high due to low attack complexity and no user interaction needed, but it requires some level of authentication, which may limit exposure to internal or semi-trusted networks. The vulnerability poses a significant risk to organizations using these devices, particularly those relying on them for security monitoring or network infrastructure.

Potential Impact

For European organizations, the impact of CVE-2023-52163 is considerable. Compromise of Digiever DS-2105 Pro devices could lead to unauthorized access to sensitive video surveillance feeds, manipulation or deletion of recorded data, and disruption of security monitoring capabilities. This undermines physical security and may facilitate further network intrusions or data breaches. The loss of device integrity and availability could interrupt critical security operations, especially in sectors like transportation, government facilities, and critical infrastructure. Since the devices are no longer supported, organizations cannot rely on vendor patches, increasing the risk of prolonged exposure. Attackers exploiting this vulnerability could establish persistent footholds within networks, potentially escalating attacks to other connected systems. The confidentiality breach of surveillance data may also violate European data protection regulations such as GDPR, leading to legal and financial repercussions.

Mitigation Recommendations

Given the absence of official patches, European organizations should adopt a multi-layered mitigation approach. First, immediately isolate affected Digiever DS-2105 Pro devices from untrusted networks and restrict access to trusted administrators only. Implement strict network segmentation to limit lateral movement if a device is compromised. Disable or restrict access to the time_tzsetup.cgi interface if possible, or block HTTP requests targeting this endpoint via web application firewalls or intrusion prevention systems. Monitor network traffic and device logs for unusual command execution patterns or unauthorized access attempts. Consider replacing unsupported devices with currently maintained and patched alternatives to eliminate the vulnerability entirely. Additionally, enforce strong authentication mechanisms and regularly audit device configurations. Finally, raise awareness among IT and security teams about the risks posed by legacy unsupported devices to prevent similar exposures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-29T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6949c5ae66e722bb4ce934e3

Added to database: 12/22/2025, 10:26:54 PM

Last enriched: 12/22/2025, 10:41:46 PM

Last updated: 12/23/2025, 3:17:05 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats