We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A USB backdoor feature can be triggered by attaching a USB drive that contains specially crafted "salia.ini" files. The .ini file can contain several "commands" that could be exploited by an attacker to export or modify the device configuration, enable an SSH backdoor or perform other administrative actions. Ultimately, this backdoor also allows arbitrary execution of OS commands.
Reserved 2025-05-20 | Published 2025-05-21 | Updated 2025-05-21 | Assigner SEC-VLabCWE-749 Exposed Dangerous Method or Function
Stefan Viehböck | SEC Consult Vulnerability Lab
r.sec-consult.com/echarge
Support options