Impact
A buffer overflow in the PLC firmware arises because authorization checks are incorrectly implemented. This flaw permits untrusted input to be processed without proper validation, enabling execution of arbitrary code. If exploited, an attacker could gain full control over the PLC, subverting its intended operation and potentially compromising any processes it governs.
Affected Systems
The vulnerability impacts Qualcomm, Inc. Snapdragon PLC devices. Exact firmware versions are not listed, but any Snapdragon PLC running the affected firmware assembly is susceptible.
Risk and Exploitability
The CVSS score of 9.6 indicates extremely high severity. EPSS data is unavailable, so the current exploit probability is unknown. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, through network traffic to the PLC management interface, since proper authorization is missing at that boundary. Successful exploitation would lead to complete compromise of the PLC system.
OpenCVE Enrichment