Impact
A self‑executable binary that runs with root privileges is located in the user "xd" home directory of the SFX2100 satellite receiver, allowing an adversary who can execute code locally to elevate privileges to root. The vulnerability is a classic SUID root weakness that can give the attacker full control of the device and its firmware. Precise exploitation possibilities include arbitrary code execution as root, manipulation of system configuration, or persistence via rogue binaries.
Affected Systems
International Datacasting Corporation’s SFX2100 Satellite Receiver running the SFX2100 firmware is affected. No version information is available. The vulnerability resides in the /home/xd/terminal/XDTerminal binary and relies on system file paths and user‑controlled symlinks or PATH entries, so any machine deploying this firmware with the default directory layout is at risk.
Risk and Exploitability
The base CVSS score of 8.6 indicates a high‑severity flaw. EPSS is reported as less than 1%; thus, while the vulnerability is currently low probability for exploitation, it remains a serious risk because local attackers—such as maintenance staff or an attacker who first compromises the device remotely—could use the SUID binary via PATH hijacking, symlink abuse, or shared object hijacking. The flaw is not listed in CISA’s KEV catalog, but its high CVSS and root escalations warrant immediate attention. The most likely attack vector is a local actor who has read‑write access to the user’s home directory or can alter PATH entries to inject malicious programs that the SUID binary will subsequently execute.
OpenCVE Enrichment