CVE-2023-51590

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to upload arbitrary files to Voltronic Power ViewPower Pro systems, leading to remote code execution. Attackers can execute commands with LOCAL SERVICE privileges, potentially gaining full control of affected devices. All installations using vulnerable versions are at risk.

💻 Affected Systems

Products:
  • Voltronic Power ViewPower Pro
Versions: Specific vulnerable versions not specified in advisory, but all versions before patch are likely affected
Operating Systems: Windows (based on LOCAL SERVICE context)
Default Config Vulnerable: ⚠️ Yes
Notes: Authentication is not required, making all exposed instances vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, pivot to other systems, disrupt power management operations, or establish persistent access.

🟠

Likely Case

Attackers upload web shells or malicious scripts to execute arbitrary commands, potentially stealing data, disrupting operations, or using the system as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the affected system, though local service compromise still allows significant damage.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing systems extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows any network user to compromise the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unrestricted file upload vulnerabilities are easily weaponized and often exploited quickly after disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: Not provided in available references

Restart Required: Yes

Instructions:

1. Contact Voltronic Power for patch information 2. Apply vendor-provided update 3. Restart ViewPower Pro service 4. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ViewPower Pro systems from untrusted networks and internet access

Web Application Firewall

all

Deploy WAF with rules blocking file uploads to UpLoadAction endpoint

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to trusted IPs only
  • Monitor for suspicious file uploads and unusual process execution from LOCAL SERVICE context

🔍 How to Verify

Check if Vulnerable:

Check if UpLoadAction endpoint accepts file uploads without authentication or proper validation

Check Version:

Check ViewPower Pro version in application interface or configuration files

Verify Fix Applied:

Test that file uploads are properly validated and restricted after patch

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to UpLoadAction endpoint
  • Process execution from unusual locations
  • Files created in web-accessible directories

Network Indicators:

  • HTTP POST requests to UpLoadAction with file uploads
  • Unusual outbound connections from ViewPower Pro system

SIEM Query:

source="ViewPower" AND (url="*UpLoadAction*" OR process="cmd.exe" OR process="powershell.exe")

🔗 References

📤 Share & Export