Impact
The vulnerability lies in the presence of the /sbin/ip utility with its setuid bit set on the International Datacasting Corporation SFX2100 satellite receiver. Because the binary runs with elevated privileges, any local user who can execute it gains root‑level access to the device. An attacker can use existing resources such as GTFObins to read files and potentially perform other privileged operations, effectively elevating their local access to full system control. This weakness corresponds to the CWE‑269 Least Privilege Violation classification.
Affected Systems
The affected systems are all International Datacasting Corporation SFX2100 Satellite Receivers that ship with the /sbin/ip binary set as setuid. The exact model or firmware revision is not specified, so the issue may affect all current units. The CPE entries cite a hardware device and its firmware, indicating the vulnerability applies to the device’s operating environment.
Risk and Exploitability
The CVSS score of 8.3 classifies this as a high‑severity vulnerability, but the EPSS assessment is below 1%, suggesting a low probability of widespread exploitation at present. The vulnerability requires local user access and exploits a simple privileged binary, so an attacker who can log into the device can run ip to gain root privileges. The lack of inclusion in the KEV catalogue means there are no known active exploits being used in the wild, but the high severity advises timely remediation.
OpenCVE Enrichment