![]() It's due to a flaw in the ubus backend communications functionality, which allows the main router and satellite devices to communicate with each other.Īn attacker with access to the web GUI password – or default password if the user never changed it – could log into a hidden telnet service, send a specially crafted JSON object and then execute arbitrary commands on the device.
0 Comments
Leave a Reply. |