Impact
The vulnerability arises from several SUID root binaries located in the /home/monitor directories of the International Datacasting SFX2100 satellite receiver. Because these executables run with root privileges, any local user who can log in as monitor can execute them and thereby gain root access, bypassing normal access controls. This is a classic privilege‑escalation flaw (CWE‑269).
Affected Systems
The affected product is the International Datacasting Corporation SFX2100 Satellite Receiver, including its firmware. All installations that contain the monitor home directory with the listed binaries are vulnerable.
Risk and Exploitability
The CVSS score of 8.6 classifies this as a high‑severity issue. The EPSS score is less than 1 %, indicating a low but nonzero likelihood of exploitation. The flaw requires local access to the monitor account, so the attack vector is local. It is inferred that the attacker must have some type of access that enables them to log in as monitor, but this is not explicitly stated in the CVE data. The vulnerability is not currently listed in the CISA KEV catalog.
OpenCVE Enrichment