1. Executive summary

2. Risk Evaluation

Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to access sensitive information and execute arbitrary code to gain root privileges.

The bottom line is that an attacker can inject any arbitrary system command they want and make it run.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following models and OS versions of cMT are affected:

3.2 VULNERABILITY OVERVIEW(취약점 개요)

The Weintek cMT7080X product is vulnerable to code injection, allowing an attacker to inject desired system commands and execute them as per their intent.