This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-coded default credentials. An attacker can leverage this vulnerability to execute code in the context of the download user.
Affected Software | Affected Version | How to fix |
---|---|---|
GE Reason RPV311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-11852 is high due to its potential for remote code execution without authentication.
To fix ZDI-CAN-11852, users should update to the latest firmware version provided by GE for the Reason RPV311.
ZDI-CAN-11852 can be exploited for remote code execution attacks by an unauthenticated attacker.
ZDI-CAN-11852 specifically affects the GE Reason RPV311 installations.
No, authentication is not required to exploit the vulnerability identified as ZDI-CAN-11852.