Описание
Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Release NotesVendor Advisory
- ExploitThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Release NotesVendor Advisory
- ExploitThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 2.8.4 (исключая)
Одновременно
cpe:2.3:o:mersive:solstice_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mersive:solstice:-:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.26364
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
больше 3 лет назад
Insufficient validation of user-supplied input for the Solstice Pod networking configuration enables authenticated attackers to execute arbitrary commands as root.
EPSS
Процентиль: 96%
0.26364
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78