Unauthenticated Remote Attackers Can Manipulate Device via Telnet
CVE-2024-6422
9.8CRITICAL
What is CVE-2024-6422?
An unauthenticated remote attacker can exploit a vulnerability found in devices from the vendor that utilize Telnet for remote management. This vulnerability allows the attacker to execute arbitrary commands, manipulate device processes, and read, delete, or modify data on the device. The lack of authentication enables attackers to gain unauthorized access, leading to a potential compromise of sensitive information and disruption of device functionality.