CVE-2017-12945
27.11.2019, 16:15
Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
Vendor | Product | Version |
---|---|---|
mersive | solstice_firmware | 𝑥 < 2.8.4 |
𝑥
= Vulnerable software versions
References