Описание
A vulnerability was found in iop-apl-uw basestation3 up to 3.0.4 and classified as problematic. This issue affects the function load_qc_pickl of the file basestation3/QC.py. The manipulation of the argument qc_file leads to deserialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The code maintainer tagged the issue as closed. But there is no new commit nor release in the GitHub repository available so far.
Ссылки
- ExploitIssue Tracking
- ExploitIssue Tracking
- ExploitIssue Tracking
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitIssue Tracking
- ExploitIssue Tracking
- ExploitIssue Tracking
Уязвимые конфигурации
EPSS
5.3 Medium
CVSS3
9.8 Critical
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
A vulnerability was found in iop-apl-uw basestation3 up to 3.0.4 and classified as problematic. This issue affects the function load_qc_pickl of the file basestation3/QC.py. The manipulation of the argument qc_file leads to deserialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The code maintainer tagged the issue as closed. But there is no new commit nor release in the GitHub repository available so far.
EPSS
5.3 Medium
CVSS3
9.8 Critical
CVSS3
4.3 Medium
CVSS2