Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3rq8-jjh5-j8v3

Опубликовано: 07 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 8.4
CVSS3: 9.8

Описание

Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.

Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.

EPSS

Процентиль: 60%
0.00393
Низкий

8.4 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 9.8
nvd
2 дня назад

Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.

EPSS

Процентиль: 60%
0.00393
Низкий

8.4 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-121