The network protocol of Blade Shadow though 2.13.3 allows remote attackers to take control of a Shadow instance and execute arbitrary code by only knowing the victims IP address, because packet data can be injected into the unencrypted UDP packet stream.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Shadow | Blade-group | * | 2.13.3 (including) |