Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6wh4-77gr-x4gj

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.

Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.

EPSS

Процентиль: 91%
0.06815
Низкий

Связанные уязвимости

nvd
почти 21 год назад

Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.

EPSS

Процентиль: 91%
0.06815
Низкий