Description
An unauthenticated attacker can reset the board and stop transmitter
operations by sending a specially-crafted GET request to the command.cgi
gateway, resulting in a denial-of-service scenario.
Published: 2024-04-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Workaround

Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-19458 An unauthenticated attacker can reset the board and stop transmitter operations by sending a specially-crafted GET request to the command.cgi gateway, resulting in a denial-of-service scenario.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-01T22:27:36.317Z

Reserved: 2024-01-05T22:07:42.993Z

Link: CVE-2024-21846

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:36.317Z

cve-icon NVD

Status : Deferred

Published: 2024-04-18T23:15:06.933

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-21846

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses