Описание
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c254 the value for the s_vol_dim_delta key is copied using strcpy to the buffer at 0xa0000514. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*
cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00771
Низкий
8.5 High
CVSS3
9.9 Critical
CVSS3
8 High
CVSS2
Дефекты
CWE-120
Связанные уязвимости
CVSS3: 9.9
github
больше 3 лет назад
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c254 the value for the s_vol_dim_delta key is copied using strcpy to the buffer at 0xa0000514. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow.
EPSS
Процентиль: 73%
0.00771
Низкий
8.5 High
CVSS3
9.9 Critical
CVSS3
8 High
CVSS2
Дефекты
CWE-120