"value":"Control By Web X-600M devices run Lua scripts and are vulnerable to code injection, which could allow an attacker to remotely execute arbitrary code."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-94 Improper Control of Generation of Code ('Code Injection')",
"value":"\n\n<p>Control By Web has provided a fix and recommends applying the updates for the following products: </p><ul><li>\n\n<ul><li>X-600M: Update firmware to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.controlbyweb.com/firmware/X600M_FieldUpdate_V1.16.00.zip\">v1.16.00</a> or later </li></ul>\n\n</li></ul>"
}
],
"value":"\nControl By Web has provided a fix and recommends applying the updates for the following products: \n\n * \n\n * X-600M: Update firmware to v1.16.00 https://www.controlbyweb.com/firmware/X600M_FieldUpdate_V1.16.00.zip \u00a0or later \n\n\n\n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"Floris Hendriks and Jeroen Wijenbergh of Radboud University reported these vulnerabilities to Control By Web. "