Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-35mj-pjqh-8j57

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Cisco ATA 187 Analog Telephone Adaptor with firmware 9.2.1.0 and 9.2.3.1 before ES build 4 does not properly implement access control, which allows remote attackers to execute operating-system commands via vectors involving a session on TCP port 7870, aka Bug ID CSCtz67038.

The Cisco ATA 187 Analog Telephone Adaptor with firmware 9.2.1.0 and 9.2.3.1 before ES build 4 does not properly implement access control, which allows remote attackers to execute operating-system commands via vectors involving a session on TCP port 7870, aka Bug ID CSCtz67038.

EPSS

Процентиль: 66%
0.00523
Низкий

Связанные уязвимости

nvd
почти 13 лет назад

The Cisco ATA 187 Analog Telephone Adaptor with firmware 9.2.1.0 and 9.2.3.1 before ES build 4 does not properly implement access control, which allows remote attackers to execute operating-system commands via vectors involving a session on TCP port 7870, aka Bug ID CSCtz67038.

EPSS

Процентиль: 66%
0.00523
Низкий