Bishop Fox has developed a proof of concept (PoC) exploit that demonstrates the severity of the vulnerability. The exploit enables remote code execution, allowing attackers to take control of the affected network gear. The researchers emphasize the urgency of applying the patch, as they were able to exploit the vulnerability successfully and gain unauthorized access to the vulnerable devices.
Outdated Systems:
In their investigation, Bishop Fox also discovered that a few devices were running an operating system version that is eight years old. It is highly recommended to keep all software and firmware up to date to ensure the latest security patches and enhancements are applied.