The affected product allows firmware updates to be...
High severity
Unreviewed
Published
Aug 8, 2025
to the GitHub Advisory Database
•
Updated Aug 8, 2025
Description
Published by the National Vulnerability Database
Aug 8, 2025
Published to the GitHub Advisory Database
Aug 8, 2025
Last updated
Aug 8, 2025
The affected product allows firmware updates to be downloaded from EG4's
website, transferred via USB dongles, or installed through EG4's
Monitoring Center (remote, cloud-connected interface) or via a serial
connection, and can install these files without integrity checks. The
TTComp archive format used for the firmware is unencrypted and can be
unpacked and altered without detection.
References