The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows malicious users to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cobham sailor 6006 message terminal - |
||
cobham sailor 6222 vhf - |
||
cobham sailor 6300 mf \\/ hf - |
||
cobham ailor 6110 mini-c gmdss - |