Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fc4m-c6c6-c2h9

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability.

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability.

EPSS

Процентиль: 35%
0.00142
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 6.7
nvd
больше 7 лет назад

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability.

EPSS

Процентиль: 35%
0.00142
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-787