Описание
In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local code execution at the root level.
Ссылки
- Product
- ExploitThird Party Advisory
- Product
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.0.1.1326 (исключая)
Одновременно
cpe:2.3:o:kramerav:via_go2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:kramerav:via_go2:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 4.0.1.1326 (исключая)
Одновременно
cpe:2.3:o:kramerav:via_connect2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:kramerav:via_connect2:-:*:*:*:*:*:*:*
EPSS
Процентиль: 19%
0.00061
Низкий
7.8 High
CVSS3
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 7.8
github
больше 2 лет назад
In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local code execution at the root level.
EPSS
Процентиль: 19%
0.00061
Низкий
7.8 High
CVSS3
Дефекты
CWE-94