FAQ
How could an attacker exploit this vulnerability?
FAQ
How can attacker successfully exploit this vulnerability? An attacker with user permissions could alter specific variables in the CNTCIR Packet of the WDSMA protocol in order to exploit this vulnerability. For more information about CNTCIR Packet see CNTCIR Packet.