CVEs Blog | G5 Cyber Security

CVE-2020-25185 – The affected product is vulnerable to five post-authentication buffer ove

The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25185

Reference (s):

Exit mobile version