The "update" binary in the firmware of the affected...
High severity
Unreviewed
Published
Feb 25, 2025
to the GitHub Advisory Database
•
Updated Feb 25, 2025
Description
Published by the National Vulnerability Database
Feb 25, 2025
Published to the GitHub Advisory Database
Feb 25, 2025
Last updated
Feb 25, 2025
The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
References