Insufficient validation of user-supplied input for the Solstice Pod prior to 2.8.4 networking configuration enables authenticated malicious users to execute arbitrary commands as root.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mersive solstice_firmware |