Impact
The vulnerability in Smart Visu Server 1.1.1050 allows an attacker to trigger a server reboot or shutdown by sending a single HTTP POST request without any authentication. Because the server does not verify the caller’s identity, an unauthenticated actor can permanently interrupt service, causing availability loss and potential operational disruption. This is a classic denial‑of‑service scenario rooted in missing authentication (CWE‑306).
Affected Systems
The affected product is the JUNG Smart Visu Server from Albrecht Jung GmbH & Co. KG. The vulnerability applies to firmware version 1.1.1050 of the Smart Visu Server, as indicated by the CPE strings and vendor product record.
Risk and Exploitability
The CVSS score of 8.7 reflects a high severity denial‑of‑service condition, but the EPSS score of less than 1 % indicates a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, and the attack vector is likely remote over the network via HTTP, with no authentication prerequisite. While the odds of exploitation are modest, the impact is significant as any login‑free admin access can bring the system down.
OpenCVE Enrichment