vendor:
                    TimeProvider 4100
                by:
                    Armando Huesca Prida
                6.1
                        CVSS
                    HIGH
                    Remote Code Execution (RCE)
                    78
                        CWE
                    Product Name: TimeProvider 4100
                    Affected Version From:  Firmware release 1.0
                    Affected Version To:  Firmware release 2.4.7
                    Patch Exists: NO
                    Related CWE: CVE-2024-9054
                    CPE:  h:microchip:timeprovider_4100:2.4.6
                    Platforms Tested:  
                    2024
                    Microchip TimeProvider 4100 (Configuration modules) 2.4.6 – OS Command Injection
A vulnerability exists in the 'secret_key' XML tag in Microchip TimeProvider 4100's configuration file, allowing remote code execution. By injecting a malicious payload into the configuration file and triggering it during login, an attacker can execute arbitrary OS commands remotely.
Mitigation:
					To mitigate this vulnerability, it is recommended to restrict access to the configuration files and ensure that they are not tampered with. Additionally, regular security audits and monitoring of the device's behavior can help in detecting any unauthorized changes.