# [CVE-2024-32651] changedetection < 0.45.20 - Remote Code Execution (RCE) On the target machine, Changedetection v 0.45.1 is running. A quick search on exploit DB will give the RCE. https://www.exploit-db.com/exploits/52027 Run the exploit code Where IP is the attacker IP and port is the listening port of the attacker. We got the root access.
On older devices, we should choose the type of cables for connectivity. If it's same kind of device, then a crossover cable and if they are different, then a Straight-through cable. To overcome this inconvenience , there is a feature introduced on network devices , Auto-MDIX.
This feature automatically detects the required cable connection type for a connection. That is, whether to use straight or Crossover. If either one of the connection device supports Auto-MDIX, then no matter the device, you can use a crossover or a straight-through cable. It also needs the speed and duplex auto-negotiation feature being enabled on the device.
This feature automatically detects the required cable connection type for a connection. That is, whether to use straight or Crossover. If either one of the connection device supports Auto-MDIX, then no matter the device, you can use a crossover or a straight-through cable. It also needs the speed and duplex auto-negotiation feature being enabled on the device.
In other words, with this feature enabled, the interface automatically corrects for any incorrect cabling.
And Automatic medium-dependent interface crossover (Auto-MDIX) is enabled by default (from IOS 12.2(20)SE on-wards).
Sample Manual configuration is shown below.
And Automatic medium-dependent interface crossover (Auto-MDIX) is enabled by default (from IOS 12.2(20)SE on-wards).
Sample Manual configuration is shown below.