Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xh62-mxvq-v84j

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.

The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.

EPSS

Процентиль: 86%
0.02718
Низкий

Дефекты

CWE-476

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.

EPSS

Процентиль: 86%
0.02718
Низкий

Дефекты

CWE-476