Commands can be injected over the network and executed without authentication.CreditsLarry Cashdollar and Aline Eliovich of Akamai Technologies reported this vulnerability to CISA.An anonymous third-party organization confirmed Akamai's report and identified specific affected products and firmware versions.Referenceshttps://www.cisa.gov/news-events/ics-advisories/icsa-24-214-07https://www.akamai.com/blog/security-research/2024-corona-mirai-botnet-infects-zero-day-sirt