Lucene search

K
zdiPhilippe Lin, Jonathan Andersson, Rainer Vosseler, Federico Maggi, Urano Akira, Stephen Hilt, Marco BalduzziZDI-18-1317
HistoryOct 25, 2018 - 12:00 a.m.

Saga Radio SAGA1-L8B Remote Controller Forced-Pairing Remote Code Execution Vulnerability

2018-10-2500:00:00
Philippe Lin, Jonathan Andersson, Rainer Vosseler, Federico Maggi, Urano Akira, Stephen Hilt, Marco Balduzzi
www.zerodayinitiative.com
8

0.002 Low

EPSS

Percentile

51.5%

This vulnerability allows remote attackers to issue commands on vulnerable installations of Saga Radio equipment. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of communication between the transmitter and receiver. By sending a crafted re-pairing packet an attacker can force a receiver to pair with a new transmitter without user interaction. An attacker can leverage this vulnerability to issue commands to the physical equipment controlled by the device.

0.002 Low

EPSS

Percentile

51.5%

Related for ZDI-18-1317