Vulnerabilities
Vulnerable Software
A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
CVSS Score
8.8
EPSS Score
0.003
Published
2023-12-05
In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.
CVSS Score
8.8
EPSS Score
0.009
Published
2023-08-03


Contact Us

Shodan ® - All rights reserved