Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.

CVSS 1 Total

ScoreSeverityVersionVector String
9.8CRITICAL3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product Status

Learn more

Versions 1 Total

Default Status: affected

affected

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.

Authorized Data Publishers