Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gpg3-wq7x-w9rj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A stack-based buffer-overflow exists in Edimax IP-Camera IC-3116W (v3.06) and IC-3140W (v3.07), which allows an unauthenticated, unauthorized attacker to perform remote-code-execution due to a crafted GET-Request. The overflow occurs in binary ipcam_cgi due to a missing type check in function doGetSysteminfo(). This has been fixed in version: IC-3116W v3.08.

A stack-based buffer-overflow exists in Edimax IP-Camera IC-3116W (v3.06) and IC-3140W (v3.07), which allows an unauthenticated, unauthorized attacker to perform remote-code-execution due to a crafted GET-Request. The overflow occurs in binary ipcam_cgi due to a missing type check in function doGetSysteminfo(). This has been fixed in version: IC-3116W v3.08.

EPSS

Процентиль: 89%
0.04353
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
около 5 лет назад

A stack-based buffer-overflow exists in Edimax IP-Camera IC-3116W (v3.06) and IC-3140W (v3.07), which allows an unauthenticated, unauthorized attacker to perform remote-code-execution due to a crafted GET-Request. The overflow occurs in binary ipcam_cgi due to a missing type check in function doGetSysteminfo(). This has been fixed in version: IC-3116W v3.08.

EPSS

Процентиль: 89%
0.04353
Низкий

Дефекты

CWE-787