Impact
Based on the provided description, the vulnerability in Hirschmann Industrial HiVision firmware versions 08.1.03 and earlier, and 08.2.00 and earlier, allows a local attacker to exploit insufficient path sanitization when executing user‑defined external applications. By placing a malicious program in the execution path, the attacker can cause the firmware to run an unintended binary. This flaw, identified as CWE‑426 (Untrusted Control Flow), can result in arbitrary code execution with elevated privileges. Depending on the privileges granted to the external application, the attacker might gain significant control over the device; the precise scope of control is inferred from the description rather than explicitly stated.
Affected Systems
Devices running Belden Hirschmann Industrial HiVision firmware 08.1.03 or earlier versions, as well as any firmware 08.2.00 or earlier, are affected. The issue pertains to the feature that lets administrators configure external application paths.
Risk and Exploitability
The CVSS score of 7 reflects a high severity impact. The EPSS score is < 1%, and the vulnerability has not been listed in CISA's KEV catalog. The flaw is exploitable by a local attacker who has write access to the device's filesystem and can place a malicious binary in the configured execution path. Once executed, the binary runs with the privileges of the external application, potentially allowing full compromise of the device.
OpenCVE Enrichment