In case of PXM30-1, PXM30, PXM40, PXM40.E, PXM50, PXM50.E, PXG3.W100-1, PXG3.W100-2 and PXG3.W200-1, a remote attacker can also install APK files on the device. These APKs can be used to install a malicious application allowing an attacker to read sensitive data, send APKs to the phone, or send arbitrary messages to the phone. In case of PXM30-1 and PXM30, a remote attacker can also execute arbitrary code on the device. This is due to the use of insecure SELinux policies on these platforms. In case of PXM40 and PXM50, a remote attacker can install a malicious application that can be used to send and receive arbitrary messages to the phone. This is due to the use of insecure SELinux policies on these platforms. In case of PXG3.W100-1 and PXG3.W100-2, a remote attacker can install a malicious application that can be used to send and receive arbitrary messages to the phone. This is due to the use of insecure SELinux policies on these platforms. All devices running these versions are vulnerable. All devices running PXM40 and PXM50 are also vulnerable. A remote attacker can also install APK files on the device

PXM20-1

, PXM20, PXM20.E and PXG3.W100-1
The remote attacker can also install APK files on the device. These APKs can be used to install a malicious application allowing an attacker to read sensitive data, send arbitrary messages to the phone, or send APKs to the phone. In case of PXM20-1 and PXM20, a remote attacker can also execute arbitrary code on the device. This is due to the use of insecure SELinux policies on these platforms.

PXM40 and PXM50

Devices Are Also Vulnerable
All devices running PXM40 and PXM50 are also vulnerable. A remote attacker can also install APK files on the device. These APKs can be used to install a malicious application that can be used to send and receive arbitrary messages. In case of PXM30-1 and PXM30, a remote attacker can also execute arbitrary code on the device. This is due to the use of insecure SELinux policies on these platforms. All devices running these versions are vulnerable.

PXM series (CVE-2023)

In case of PXM30-1, PXM30, PXM40, PXM40.E, PXM50, PXM50.E, PXG3.W100-1, PXG3.W100-2 and PXG3.W200-1, a remote attacker can also install APK files on the device. These APKs can be used to install a malicious application allowing an attacker to read sensitive data, send APKs to the phone, or send arbitrary messages to the phone. In case of PXM30-1 and PXM30, a remote attacker can also execute arbitrary code on the device. This is due to the use of insecure SELinux policies on these platforms. In case of PXM30-1 and PXP60WDV10iPWM0F0V0220a003c00f00d001h00050000e000000010000000800000008001000000100000001000000000000c000000402000000600000000000000640000000800000000000000060000000c2000e00012000009a90719101080200000001f080005001380050004b821805010201008018080835274017ffffffffff0610b90cd2f2488ce5781

Link: https://www.dhs.gov/sites/default/files/cyber_security_public_notification_

PXM30

-1 and PXM30
These devices are vulnerable to APK attacks. These platforms use insecure SELinux policies that allow for the installation of malicious applications and the execution of arbitrary code from untrusted sources. In case of PXM30-1, a remote attacker can also execute arbitrary code on the device. This is due to the use of insecure SELinux policies on this platform. In case of PXM30, a remote attacker can read sensitive data on the device or send arbitrary messages to it. This is due to the use of insecure SELinux policies on this platform.

PXM Series

The PXM series of routers are vulnerable to a remote attack. All devices running these versions are vulnerable. The PXM30-1, the PXM30, the PXM40 and the PXM50 are also vulnerable. A remote attacker can install APK files on the device and cause other issues with it.

Timeline

Published on: 10/11/2022 11:15:00 UTC
Last modified on: 10/12/2022 16:42:00 UTC

References