Логотип exploitDog
bind:CVE-2024-54809
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-54809

Количество 3

Количество 3

nvd логотип

CVE-2024-54809

10 месяцев назад

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2mf8-xmm6-qx35

10 месяцев назад

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-03669

около 1 года назад

Уязвимость функции parse_st() службы UPnP (Universal Plug and Play) микропрограммного обеспечения маршрутизаторов Netgear WNR854T, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-54809

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

CVSS3: 9.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-2mf8-xmm6-qx35

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.

CVSS3: 9.8
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-03669

Уязвимость функции parse_st() службы UPnP (Universal Plug and Play) микропрограммного обеспечения маршрутизаторов Netgear WNR854T, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
0%
Низкий
около 1 года назад

Уязвимостей на страницу