<s>
Misfortune	B-Architecture
Cookie	I-Architecture
is	O
a	O
computer	O
software	O
vulnerability	O
found	O
in	O
the	O
firmware	B-Application
of	O
certain	O
network	B-Protocol
routers	I-Protocol
which	O
can	O
be	O
leveraged	O
by	O
an	O
attacker	O
to	O
gain	O
access	O
remotely	O
.	O
</s>
<s>
With	O
the	O
combination	O
of	O
its	O
severity	O
,	O
ease	O
of	O
exploiting	O
,	O
lack	O
of	O
practically	O
any	O
preconditions	O
and	O
the	O
sheer	O
volume	O
of	O
affected	O
networks	O
,	O
the	O
Misfortune	B-Architecture
Cookie	I-Architecture
could	O
be	O
considered	O
truly	O
unique	O
.	O
</s>
<s>
The	O
attacker	O
in	O
this	O
scenario	O
sends	O
a	O
crafted	O
HTTP	B-Application
cookie	I-Application
attribute	O
to	O
the	O
vulnerable	O
system	O
's	O
(	O
network	B-Protocol
router	I-Protocol
)	O
web-management	O
portal	O
,	O
where	O
the	O
attacker	O
's	O
content	O
overwrites	O
the	O
device	O
memory	O
.	O
</s>
<s>
The	O
contents	O
of	O
the	O
cookie	B-Application
act	O
as	O
command	O
to	O
the	O
router	B-Protocol
which	O
then	O
abides	O
by	O
the	O
commands	O
.	O
</s>
<s>
This	O
includes	O
around	O
200	O
different	O
router	B-Protocol
brands	O
.	O
</s>
<s>
In	O
2018	O
,	O
the	O
vulnerability	O
again	O
gained	O
traction	O
as	O
the	O
vulnerable	O
firmware	B-Application
was	O
used	O
in	O
medical	O
equipment	O
that	O
could	O
potentially	O
cause	O
life-threatening	O
attacks	O
via	O
IoT	B-Operating_System
.	O
</s>
