{"id":"CVE-2023-48123","details":"An issue in Netgate pfSense Plus v.23.05.1 and before and pfSense CE v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the packet_capture.php file.","modified":"2026-03-14T12:22:59.312851Z","published":"2023-12-06T20:15:07.240Z","references":[{"type":"ADVISORY","url":"https://docs.netgate.com/downloads/pfSense-SA-23_11.webgui.asc"},{"type":"FIX","url":"https://github.com/pfsense/pfsense/commit/f72618c4abb61ea6346938d0c93df9078736b775"},{"type":"FIX","url":"https://redmine.pfsense.org/issues/14809"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pfsense/pfsense","events":[{"introduced":"0"},{"fixed":"f72618c4abb61ea6346938d0c93df9078736b775"}]},{"type":"GIT","repo":"https://github.com/pfsense/pfsense","events":[{"introduced":"0"},{"fixed":"f72618c4abb61ea6346938d0c93df9078736b775"}]}],"versions":["RELENG_2_2_BETA","Root_RELENG_1_2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"23.05.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-48123.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}