Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hqh5-gm7w-5966

Опубликовано: 25 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.

A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.

EPSS

Процентиль: 41%
0.0019
Низкий

8.1 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 6.8
nvd
больше 3 лет назад

A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.

EPSS

Процентиль: 41%
0.0019
Низкий

8.1 High

CVSS3

Дефекты

CWE-121