First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPDM_wemCmdUpdFSpeDecomp function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Alpine Halo9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-849 is critical due to its potential to allow arbitrary code execution without authentication.
To fix ZDI-24-849, update the Alpine Halo9 devices to the latest firmware that addresses this vulnerability.
ZDI-24-849 can enable physical attackers to execute arbitrary commands on the affected devices without prior authentication.
ZDI-24-849 affects installations of the Alpine Halo9 devices.
No, authentication is not required to exploit ZDI-24-849.