Tcis 3 Firmware
Monthly
A product has an authenticated command injection vulnerability (CVSS 10.0) allowing execution of arbitrary OS commands on the underlying system.
This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device. [CVSS 8.6 HIGH]
Command injection via the hostname field allowing authenticated code execution with maximum CVSS 10.0 and scope change.
A product has an authenticated command injection vulnerability (CVSS 10.0) allowing execution of arbitrary OS commands on the underlying system.
This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device. [CVSS 8.6 HIGH]
Command injection via the hostname field allowing authenticated code execution with maximum CVSS 10.0 and scope change.