A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions.
2025-07-09T09:15:26.720
2025-07-10T13:17:30.017
Awaiting Analysis
a6d3dc9e-0591-4a13-bce7-0f5b31ff6158
CVSSv3.1: 4.1 (MEDIUM)
-