Voltronic Power ViewPower Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI interface, which listens on TCP port 51099 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22012.
History

Wed, 09 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Voltronicpower
Voltronicpower viewpower
CPEs cpe:2.3:a:voltronicpower:viewpower:1.04.21353:*:*:*:-:*:*:*
Vendors & Products Voltronicpower
Voltronicpower viewpower

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T02:15:09.259Z

Updated: 2024-08-02T22:40:33.840Z

Reserved: 2023-12-20T20:38:20.867Z

Link: CVE-2023-51576

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:33.840Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-03T03:16:16.953

Modified: 2025-07-09T17:01:42.107

Link: CVE-2023-51576

cve-icon Redhat

No data.