Unrated severityNVD Advisory· Published Aug 15, 2014· Updated May 6, 2026
CVE-2014-0328
CVE-2014-0328
Description
The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Affected products
4- cpe:2.3:h:cobham:ailor_6110_mini-c_gmdss:-:*:*:*:*:*:*:*
- cpe:2.3:h:cobham:sailor_6006_message_terminal:-:*:*:*:*:*:*:*
- cpe:2.3:h:cobham:sailor_6222_vhf:-:*:*:*:*:*:*:*
- cpe:2.3:h:cobham:sailor_6300_mf_\/_hf:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.kb.cert.org/vuls/id/179732nvdThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.