{"uuid": "e2599e20-5652-4edb-9c64-9b46c43eae9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6320", "type": "seen", "source": "https://t.me/arpsyndicate/4510", "content": "#ExploitObserverAlert\n\nCVE-2023-6320\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-6320. A command injection vulnerability exists in the com.webos.service.connectionmanager/tv/setVlanStaticAddress endpoint on webOS versions 5 and 6. A series of specially crafted requests can lead to command execution as the dbus user. An attacker can make authenticated requests to trigger this vulnerability.  Full versions and TV models affected:   *  webOS 5.5.0 - 04.50.51 running on OLED55CXPUA\u00a0    *  webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T10:58:43.000000Z"}