Description
Commands can be injected over the network and executed without authentication.
References
https://www.akamai.com/blog/security-research/2024-corona-mirai-botnet-infects-zero-day-sirt
ExploitThird Party Advisory
https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-07
Third Party AdvisoryUS Government Resource
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-08-02T13:16:37.163Z
1 year agoLast modified
2024-09-17T11:30:55.010Z
1 year ago