{"vulnerability": "CVE-2023-43743", "sightings": [{"uuid": "71f6d044-be05-461f-be79-3c06e46c9436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43743", "type": "seen", "source": "https://t.me/ctinow/161043", "content": "https://ift.tt/LjIyz6K\nCVE-2023-43743 | Zultys MX-SE/MX-SE II/MX-E/MX-Virtual/MX250/MX30 prior 16.04 Patch 16109/17.0.10 Patch 17161 Web Interface /newapi/ filter sql injection (ATREDIS-2023-0002)", "creation_timestamp": "2023-12-31T10:16:47.000000Z"}, {"uuid": "fd1506cc-47c3-4a20-963e-6fc498560f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-43743", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-43743\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability in Zultys MX-SE, MX-SE II, MX-E, MX-Virtual, MX250, and MX30 with firmware versions prior to 17.0.10 patch 17161 and 16.04 patch 16109 allows an authenticated attacker to execute arbitrary SQL queries on the backend database via the filter parameter in requests to the /newapi/ endpoint in the Zultys MX web interface.\n\ud83d\udccf Published: 2023-12-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-27T15:34:49.986Z\n\ud83d\udd17 References:\n1. https://mxvirtual.com\n2. https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0002.md", "creation_timestamp": "2025-05-27T15:49:17.000000Z"}]}