Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-82wq-479r-x8x9

Опубликовано: 26 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 7

Описание

With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.

With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.

EPSS

Процентиль: 4%
0.00018
Низкий

7 High

CVSS4

Дефекты

CWE-1234

Связанные уязвимости

nvd
14 дней назад

With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.

EPSS

Процентиль: 4%
0.00018
Низкий

7 High

CVSS4

Дефекты

CWE-1234