Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j5r6-wf58-2j94

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

EPSS

Процентиль: 84%
0.02257
Низкий

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

EPSS

Процентиль: 84%
0.02257
Низкий

Дефекты

CWE-120