Vulnerabilities
Vulnerable Software
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
CVSS Score
9.8
EPSS Score
0.027
Published
2022-06-21


Contact Us

Shodan ® - All rights reserved