CISA description
Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
Crestron · Multiple Products
Crestron Multiple Products Command Injection Vulnerability
Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
Apply updates per vendor instructions.
Vulnerability data triggers these controls during assessment and continuous monitoring.