Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrf6-v8xr-fg2f

Опубликовано: 13 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching _0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching _0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

EPSS

Процентиль: 69%
0.00615
Низкий

8.8 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 8.8
nvd
3 месяца назад

A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching <parameter>_0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

CVSS3: 8.8
fstec
4 месяца назад

Уязвимость функции get_merge_ipaddr() микропрограммного обеспечения маршрутизаторов Linksys E1200, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 69%
0.00615
Низкий

8.8 High

CVSS3

Дефекты

CWE-121