From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Description: - This vulnerability allows direct HTTP access to , enabling execution of arbitrary methods within the C library. - The "glC" binary fails to properly sanitize received JSON data, allowing path traversal sequences such as to be sent within the parameter. - This could lead to potential arbitrary code execution. 2. Affected Products: - A list of affected product models is provided, including MT6000, A1300, AX1800, AXT1800, MT2500, MT3000, X3000, XE3000, E750, X750, SFT1200, AR300M, AR300M16, AR750, AR750S, B1300, MT1300, MT300N-V2, AP1300, B2200, MV1000, MV1000W, USB150, SF1200, N300, S1300. 3. Affected Firmware Versions: - A list of affected firmware versions is provided, including: - MT6000: 4.5.8 - A1300/X300B: 4.5.16 - AX1800/AXT1800/MT2500/MT3000: 4.5.16 - X3000/XE3000: 4.4.8 - XE300: 4.3.16 - E750: 4.3.12 - X750/SFT1200/AR300M/AR300M16/AR750/AR750S/B1300/MT1300/MT300N-V2: 4.3.11 - AP1300: 3.217 - B2200/MV1000/MV1000W/USB150/SF1200/N300/S1300: 3.216 4. Exploitation Method: - Example exploitation methods are provided, including using commands to send HTTP requests. 5. Impact: - Attackers can exploit code execution within the C library combined with path traversal to execute malicious code, thereby compromising the router. This information helps in understanding the nature of the vulnerability, the scope of affected devices, and how the vulnerability can be exploited.