A low privileged remote attacker with file access can...
High severity
Unreviewed
Published
Jul 8, 2025
to the GitHub Advisory Database
•
Updated Jul 8, 2025
Description
Published by the National Vulnerability Database
Jul 8, 2025
Published to the GitHub Advisory Database
Jul 8, 2025
Last updated
Jul 8, 2025
A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
References