Impact
The vulnerability arises from incorrect permission assignment on a critical resource within Owl CyberDefense Opds, allowing an attacker to manipulate files on the device through a crafted network request. This flaw can enable modification of configuration, firmware, or other system files, potentially facilitating further compromise or denial of service. The weakness is classified as CWE‑732, indicating improper access control over write permissions.
Affected Systems
Owl CyberDefense Opds hardware models Opds‑1000 and Opds‑100, as well as the Opds Talon version 2.2.0.4, are affected. The vulnerability is documented for the 2.2.0.4 firmware, and users of earlier or earlier generation hardware should verify whether the same permission logic applies. Vendors and administrators should check the exact device model and firmware version against the CVE advisory to determine if the device is impacted.
Risk and Exploitability
The CVSS score of 8.5 classifies the issue as high severity, while the EPSS score of less than 1 percent indicates a very low probability of exploitation at present. The likely attack vector is over the network, as the description indicates that a crafted network request can trigger file manipulation. Since the vulnerability is not listed in the CISA KEV catalogue, there is no evidence of widespread exploitation, but its high severity and the potential for critical file changes warrant prompt mitigation.
OpenCVE Enrichment