Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-8335

Опубликовано: 18 июн. 2019
Источник: nvd
CVSS3: 8
CVSS2: 6
EPSS Низкий

Описание

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of setting name for wireless network. These values are stored by the device in NVRAM (Non-volatile RAM). It seems that the POST parameters passed in this request to set up names on the device do not have a string length check on them. This allows an attacker to send a large payload in the "mssid_1" POST parameter. The device also allows a user to view the name of the Wifi Network set by the user. While processing this request, the device calls a function named "getCfgToHTML" at address 0x004268A8 which retrieves the value set earlier by "mssid_1" parameter as SSID2 and this value then results in overflowing the stack set up for this function and allows an attacker to control $ra register value on the stack which allows an attacker to control the device by executing a payload of an attacker's choice. If the firmware version AL-R096 is dissect

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:securifi:almond_2015_firmware:al-r096:*:*:*:*:*:*:*
cpe:2.3:h:securifi:almond_2015:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:securifi:almond\+firmware:al-r096:*:*:*:*:*:*:*
cpe:2.3:h:securifi:almond\+:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:securifi:almond_firmware:al-r096:*:*:*:*:*:*:*
cpe:2.3:h:securifi:almond:-:*:*:*:*:*:*:*

EPSS

Процентиль: 65%
0.00488
Низкий

8 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 8
github
больше 3 лет назад

An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of setting name for wireless network. These values are stored by the device in NVRAM (Non-volatile RAM). It seems that the POST parameters passed in this request to set up names on the device do not have a string length check on them. This allows an attacker to send a large payload in the "mssid_1" POST parameter. The device also allows a user to view the name of the Wifi Network set by the user. While processing this request, the device calls a function named "getCfgToHTML" at address 0x004268A8 which retrieves the value set earlier by "mssid_1" parameter as SSID2 and this value then results in overflowing the stack set up for this function and allows an attacker to control $ra register value on the stack which allows an attacker to control the device by executing a payload of an attacker's choice. If the firmware version AL-R096 is diss...

EPSS

Процентиль: 65%
0.00488
Низкий

8 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-119