Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.
Solution:
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11 | third party advisory us government resource |
https://birddog.tv/downloads/ | product |