Description
An unauthenticated attacker can reset the board and stop transmitter
operations by sending a specially-crafted GET request to the command.cgi
gateway, resulting in a denial-of-service scenario.
operations by sending a specially-crafted GET request to the command.cgi
gateway, resulting in a denial-of-service scenario.
No analysis available yet.
Remediation
Vendor Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19458 | An unauthenticated attacker can reset the board and stop transmitter operations by sending a specially-crafted GET request to the command.cgi gateway, resulting in a denial-of-service scenario. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T22:27:36.317Z
Reserved: 2024-01-05T22:07:42.993Z
Link: CVE-2024-21846
Updated: 2024-08-01T22:27:36.317Z
Status : Deferred
Published: 2024-04-18T23:15:06.933
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-21846
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD