
Cloud Vulnerability DB
A community-led vulnerabilities database
The Nanoleaf Desktop App before version 1.3.1 contains a critical command injection vulnerability (CVE-2022-46640) that can be exploited via a crafted HTTP request. The vulnerability was discovered and disclosed in December 2022, affecting Windows users of the Nanoleaf Desktop application (Pwning Tech, NVD).
The vulnerability exists in the Windows WiFi network subsystem of the application, specifically in an unauthenticated Express.js API endpoint that handles WiFi network changes. The application runs a web server that binds to all interfaces (0.0.0.0) on port 56751, making it remotely accessible. The command injection occurs in the validateWifiPassword endpoint, where user-supplied WiFi SSID names are not properly sanitized before being used in system commands. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
The vulnerability allows remote attackers to execute arbitrary commands with elevated privileges on affected Windows systems running the Nanoleaf Desktop App. This can lead to complete system compromise, as attackers can execute commands in the context of the application. Additionally, the vulnerability enables Remote Wireless Reconfiguration (RWR), allowing attackers to manipulate the target device's WiFi connections (Pwning Tech).
The vulnerability has been patched in Nanoleaf Desktop App version 1.3.1. Users should update to this version or later immediately. Additional recommended mitigations include using firewalls to deny incoming traffic by default, binding services only to required interfaces (localhost/127.0.0.1), and implementing proper input sanitization for user-controlled data (Pwning Tech).
The vulnerability was disclosed through coordinated vulnerability disclosure (CVD) in December 2022. The vendor responded promptly by releasing a patch within a month of notification and granted permission for public disclosure of the vulnerability details while maintaining anonymity (Pwning Tech).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."