CVE-2017-12945
27.11.2019, 16:15
Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
| Vendor | Product | Version |
|---|---|---|
| mersive | solstice_firmware | 𝑥 < 2.8.4 |
𝑥
= Vulnerable software versions
References