A write-what-where vulnerability exists in the Programming Software Connection Remote Memory Diagnostics functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to an arbitrary write. An attacker can send an unauthenticated packet to trigger this vulnerability.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1940 | third party advisory exploit |
https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yXV2AY/sa00036 | vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1940 | third party advisory exploit |