LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vul...
10CVSS
9.6AI Score
0.002EPSS
LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
10CVSS
9.4AI Score
0.002EPSS
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
10CVSS
9.6AI Score
0.002EPSS
LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
9.1CVSS
9.3AI Score
0.002EPSS
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
7.4CVSS
5.7AI Score
0.001EPSS