operations by sending a specially-crafted GET request to the command.cgi
gateway, resulting in a denial-of-service scenario.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19458 | An unauthenticated attacker can reset the board and stop transmitter operations by sending a specially-crafted GET request to the command.cgi gateway, resulting in a denial-of-service scenario. |
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T22:27:36.317Z
Reserved: 2024-01-05T22:07:42.993Z
Link: CVE-2024-21846
Updated: 2024-08-01T22:27:36.317Z
Status : Deferred
Published: 2024-04-18T23:15:06.933
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-21846
No data.
OpenCVE Enrichment
No data.
EUVD