Vulnerabilities: Cross-site Request Forgery, Improper Authentication
The following versions of JTC-200, a TCP/IP converter, are affected:
- JTC-200 all versions.
Successful exploitation of these vulnerabilities
could allow for remote code execution on the device with elevated privileges.
Read on for details.