Impact
The vulnerability in Owl Cyberdefense Opds 2.2.0.4 allows an attacker to manipulate the file search path through a crafted network request. By controlling the search path, a malicious actor could cause the system to load and execute unwanted or compromised binaries, potentially leading to code execution or privilege escalation on the affected device. The weakness is identified as a classic uncontrolled search path element, which can compromise confidentiality, integrity, and availability if an attacker gains the ability to execute arbitrary binaries.
Affected Systems
Products affected are Owl:opds, specifically the owlcyberdefense opds-1000 and opds-100 families, along with the opds-talon device running version 2.2.0.4. The vulnerability applies to hardware devices and embedded systems listed under these identifiers.
Risk and Exploitability
With a CVSS score of 8.4, the severity is high. The EPSS score of less than 1% indicates a low probability of exploitation in the wild at this time, and the vulnerability is not currently listed in the CISA KEV catalog. The attack vector is inferred to be remote, relying on network communication that carries the crafted request to the Opds device. No elevated privileges are required to exploit the flaw, so any network-accessible instance is a potential target.
OpenCVE Enrichment