DJI drone code execution | CVE-2023-51456

NAME
__________
DJI drone code execution

Platforms Affected:
DJI Mavic 3 01.01.0000 Pro
DJI Mavic 3 01.01.0000
DJI Mavic 3 01.01.0000 Classic
DJI Mavic 3 7.01.00.00 Enterprise
DJI Matrice 300 57.00.00.00
DJI Matrice M30 07.00.0000
DJI Mini 3 01.00.0000 Pro

Risk Level:
6.8

Exploitability:
Unproven

Consequences:
Gain Access

DESCRIPTION
__________

DJI drone could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an improper input validation issue affecting the v2_sdk_service running on a set of DJI drone devices on the port 10000. By sending a specially crafted payload, an attacker could exploit this vulnerability to trigger an out-of-bound read/write into the process memory and execute arbitrary code on the system.

CVSS 3.0 Information
__________

Privileges Required:
Low

User Interaction:
Required

Scope:
Unchanged

Access Vector:
Adjacent Network


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.