Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2qjj-5hcf-4j4c

Опубликовано: 08 июл. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the AdvDefaultPreference request's parameter.

Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the AdvDefaultPreference request's parameter.

EPSS

Процентиль: 91%
0.0731
Низкий

7.2 High

CVSS3

Дефекты

CWE-121
CWE-787

Связанные уязвимости

CVSS3: 7.2
nvd
больше 1 года назад

Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `AdvDefaultPreference` request's parameter.

EPSS

Процентиль: 91%
0.0731
Низкий

7.2 High

CVSS3

Дефекты

CWE-121
CWE-787