-By setting a malicious string when configuring the on-board WiFi via a BLE module of an affected robot, then triggering a restart of the WiFi service, an attacker can ultimately trigger commands to be run as root via the `wpa_supplicant_restart.sh` shell script. This is an instance of [CWE-78], "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')," and an estimate of the CVSS vectors is [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), which scores as an **7.8**. The relevant [SSVC] vectors for this vulnerability are *Exploitation: PoC* and *Technical Impact: Total*.
0 commit comments