Описание
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bb1c the value for the uri key is copied using strcpy to the buffer at 0xa00016a0. This buffer is 64 bytes large, sending anything longer will cause a buffer overflow.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*
cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00771
Низкий
8.5 High
CVSS3
9.9 Critical
CVSS3
8 High
CVSS2
Дефекты
CWE-120
Связанные уязвимости
CVSS3: 9.9
github
больше 3 лет назад
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bb1c the value for the uri key is copied using strcpy to the buffer at 0xa00016a0. This buffer is 64 bytes large, sending anything longer will cause a buffer overflow.
EPSS
Процентиль: 73%
0.00771
Низкий
8.5 High
CVSS3
9.9 Critical
CVSS3
8 High
CVSS2
Дефекты
CWE-120