Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-22m2-mv56-5hwq

Опубликовано: 18 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service.

A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service.

EPSS

Процентиль: 13%
0.00044
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 6.5
nvd
8 дней назад

A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service.

EPSS

Процентиль: 13%
0.00044
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-121