A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
AI Intelligence Brief
AI Intelligence
Analyzing vulnerability vectors…
🛡️CVE Intelligence Platform
Welcome to THREATQUARTERS
Your command center for real-time vulnerability intelligence — built for security professionals who need answers fast.
Search 200,000+ CVEs by ID, keyword, or technology
Instant CVSS scores, severity ratings and exploit / PoC links