Impact
An overflow occurs in the device’s heap when it processes redirect URLs, which provides a path for an attacker to inject arbitrary code and execute it with the device’s privileges. Based on the description, it is inferred that an attacker can craft a malicious redirect URL that triggers the buffer overflow and runs arbitrary code. The flaw is a classic heap‑based buffer overflow identified as CWE‑122, and the impact is the potential for full compromise of the device.
Affected Systems
The vulnerability affects Silex Technology, Inc.’s AMC Manager and SD‑330AC products. No specific version numbers are listed, so all releases that contain the redirect‑URL handling routine may be impacted until a fix is applied.
Risk and Exploitability
The CVSS score of 9.3 classifies the issue as high severity, indicating a significant threat if exploited. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, yet the lack of these metrics does not lower the risk. Based on the description, it is inferred that an attacker can exploit the flaw over the network by sending a crafted redirect URL to the device, after which arbitrary code runs with the device’s privileges. The high CVSS score and the nature of the vulnerability suggest that exploitation could lead to complete system compromise, lateral movement, and data exfiltration.
OpenCVE Enrichment