Описание
The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
Ссылки
- ExploitThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:sound4:pulse-eco_aes67_firmware:1.22:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse-eco_aes67:-:*:*:*:*:*:*:*
EPSS
Процентиль: 36%
0.00153
Низкий
8.8 High
CVSS3
Дефекты
CWE-494
Связанные уязвимости
CVSS3: 8.8
github
5 месяцев назад
The Sound4 PULSE-ECO AES67 1.22 web-based management interface is vulnerable to Remote Code Execution (RCE) via a malicious firmware update package. The update mechanism fails to validate the integrity of manual.sh, allowing an attacker to inject arbitrary commands by modifying this script and repackaging the firmware.
EPSS
Процентиль: 36%
0.00153
Низкий
8.8 High
CVSS3
Дефекты
CWE-494