Thanks for fixing this!
Is there an easy way to verify that it's not vulnerable? or do you have to test with the exploit for this CVE?
I just updated to the 376.49_5 but noticed that the ports are still open
Code:$ netstat -ln | grep 999 tcp 0 0 0.0.0.0:9998 0.0.0.0:* LISTEN udp 0 0 0.0.0.0:9999 0.0.0.0:* $ netcat -z -v -u 192.168.1.1 9999 Connection to 192.168.1.1 9999 port [udp/*] succeeded!
//Michael
You have to specifically test the exploit (that's how I tested with the Python proof-of-concept). The service still listens to 9999/udp, however the specific packet command that allowed to run a program has been disabled. The rest of the device discovery capabilities are untouched.