Multiple Pimax products accept WebSocket connections from unintended endpoints. If this vulnerability is exploited, arbitrary code may be executed by a remote unauthenticated attacker.
The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint.
Link | Tags |
---|---|
https://pimax.com/pages/downloads-manuals | product |
https://github.com/OpenMAR/PiTool | product |
https://jvn.jp/en/jp/JVN50850706/ | third party advisory |