CVE-2014-125001

A vulnerability classified as critical has been found in Cardo Systems Scala Rider Q3. Affected is the file /cardo/api of the Cardo-Updater. Unauthenticated remote code execution with root permissions is possible. Firewalling or disabling the service is recommended.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cardosystems:scala_rider_q3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cardosystems:scala_rider_q3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
References () http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/ - Exploit, Third Party Advisory () http://www.remote-exploit.org/archives/2014/06/03/ride_with_the_devil/ - Exploit, Third Party Advisory
References () https://vuldb.com/?id.13428 - Third Party Advisory () https://vuldb.com/?id.13428 - Third Party Advisory
CVSS v2 : 8.3
v3 : 8.8
v2 : 8.3
v3 : 8.1

Information

Published : 2022-05-24 16:15

Updated : 2024-11-21 02:03


NVD link : CVE-2014-125001

Mitre link : CVE-2014-125001

CVE.ORG link : CVE-2014-125001


JSON object : View

Products Affected

cardosystems

  • scala_rider_q3
  • scala_rider_q3_firmware
CWE
CWE-269

Improper Privilege Management