An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.
How easy to exploit
Severity of consequences
Likelihood of exploitation in next 30 days