Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7v6-qmgv-768h

Опубликовано: 15 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

EPSS

Процентиль: 86%
0.03096
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

EPSS

Процентиль: 86%
0.03096
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-121