Impact
A flaw in Cisco IoT Field Network Director’s web‑based management interface allows an authenticated attacker with low privileges to submit crafted input, which triggers improper error handling and forces the router to load an unauthorized file. This action causes the router to reload, resulting in a denial‑of‑service condition for the managed device. The vulnerability is a classic access‑control weakness (CWE‑284).
Affected Systems
Cisco IoT Field Network Director (IoT‑FND) is affected. Version information is not specified in the advisory.
Risk and Exploitability
The CVSS score of 7.7 indicates a high severity level. No EPSS score was published and the vulnerability is not listed in the CISA KEV catalog, suggesting limited exploitation data. The likely attack vector is remote via the web management interface, requiring an authenticated session with low‑privilege rights. Successful exploitation would render a target router unavailable by forcing it to reload, potentially disrupting network operations and service availability.
OpenCVE Enrichment