""ET EXPLOIT Possible Uniview IPC2322lb updatecpld Restricted Shell Bypass Attempt""

SID: 2051785

Revision: 1

Class Type: bad-unknown

Metadata: affected_product IoT, attack_target IoT, tls_state plaintext, created_at 2024_03_25, deployment Perimeter, confidence Medium, signature_severity Major, updated_at 2024_03_25

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: 23

Flow: established,to_server

Contents:

  • Value: "User|40 2f|"

  • Value: ">updatecpld|20|"

Within: 30

PCRE:

Special Options:

  • nocase

  • fast_pattern

source