{"uuid": "ff5b3808-2784-48fd-85b8-bc4a21c39253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-6319", "type": "seen", "source": "https://t.me/arpsyndicate/4478", "content": "#ExploitObserverAlert\n\nCVE-2023-6319\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-6319. A command injection vulnerability exists in the getAudioMetadata\u00a0method from the com.webos.service.attachedstoragemanager service on webOS version 4 through 7. A series of specially crafted requests can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.    *  webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA\u00a0    *  webOS 5.5.0 - 04.50.51 running on OLED55CXPUA\u00a0    *  webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB\u00a0    *  webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T08:19:28.000000Z"}