From this webpage screenshot, the following key vulnerability information can be obtained: 1. Affected Product: ALR-F800 2. Vendor: Alien Technology 3. Product Page: https://www.alientechnology.com/products/readers/alr-f800/ 4. Affected System Versions: 19.10.24.00 and earlier 5. Firmware Download Link: https://www.alientechnology.com/download/alr-f800-software/?wpdmdl=7609&ind=MTU3NTQ4MjY2NndwZG1fYWxpZW4tZmlybXdhcmVfMTkuMTAuMjQuMDBfZjgwMC5hZWQ 6. Shodan Keyword: 7. Reporter: Wentao Yang (pushe4x@gmail.com) 8. Description: ALR-F800 is a high-performance RFID reader with Gatescape network interface. Several vulnerabilities exist, allowing unauthorized attackers to modify network interface login credentials and execute arbitrary commands. 9. Unauthorized Command Execution Vulnerability: The vulnerability resides in , enabling unauthorized attackers to execute arbitrary CLI commands, including modifying network configurations and login credentials. 10. POC: Example demonstrating how to exploit the vulnerability to execute commands. 11. Command Injection Vulnerability 1: The vulnerability exists in , allowing attackers to execute system commands by uploading malicious files. 12. Command Injection Vulnerability 2: The vulnerability exists in , allowing attackers to execute system commands by uploading malicious files. This information provides a detailed overview of the vulnerabilities in ALR-F800, including the affected product, vendor, affected system versions, firmware download link, Shodan keyword, reporter, vulnerability description, exploitation methods for unauthorized command execution, and command injection vulnerabilities.