Описание
In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.).
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:juuko:k-808_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:juuko:k-808:-:*:*:*:*:*:*:*
EPSS
Процентиль: 46%
0.00235
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-294
Связанные уязвимости
github
больше 3 лет назад
In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.).
EPSS
Процентиль: 46%
0.00235
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-294