Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2mf8-xmm6-qx35

Опубликовано: 31 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

EPSS

Процентиль: 40%
0.00183
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 9.8
nvd
10 месяцев назад

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

CVSS3: 8
fstec
около 1 года назад

Уязвимость функции parse_st() службы UPnP (Universal Plug and Play) микропрограммного обеспечения маршрутизаторов Netgear WNR854T, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 40%
0.00183
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-121