This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Schneider Electric C-Bus Toolkit. Authentication is not required to exploit this vulnerability. The specific flaw exists within the FileCommand command. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
schneider-electric spacelogic c-bus toolkit |