Описание
This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.
This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.
Связанные уязвимости
This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.
Уязвимость микропрограммного обеспечения коммутационных шлюзов Zenitel ICX500 и ICX510, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю вызвать отказ в обслуживании