An unauthenticated attacker can reset the board and stop transmitter
operations by sending a specially-crafted GET request to the command.cgi
gateway, resulting in a denial-of-service scenario.
operations by sending a specially-crafted GET request to the command.cgi
gateway, resulting in a denial-of-service scenario.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19458 | An unauthenticated attacker can reset the board and stop transmitter operations by sending a specially-crafted GET request to the command.cgi gateway, resulting in a denial-of-service scenario. |
Fixes
Solution
No solution given by the vendor.
Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T22:27:36.317Z
Reserved: 2024-01-05T22:07:42.993Z
Link: CVE-2024-21846
Updated: 2024-08-01T22:27:36.317Z
Status : Awaiting Analysis
Published: 2024-04-18T23:15:06.933
Modified: 2024-11-21T08:55:06.823
Link: CVE-2024-21846
No data.
OpenCVE Enrichment
No data.
EUVD