Количество 3
Количество 3
CVE-2024-25139
In TP-Link Omada er605 1.0.1 through (v2.6) 2.2.3, a cloud-brd binary is susceptible to an integer overflow that leads to a heap-based buffer overflow. After heap shaping, an attacker can achieve code execution in the context of the cloud-brd binary that runs at the root level. This is fixed in ER605(UN)_v2_2.2.4 Build 020240119.
GHSA-xhjf-xjwg-rm34
In TP-Link Omada er605 1.0.1 through (v2.6) 2.2.3, a cloud-brd binary is susceptible to an integer overflow that leads to a heap-based buffer overflow. After heap shaping, an attacker can achieve code execution in the context of the cloud-brd binary that runs at the root level. This is fixed in ER605(UN)_v2_2.2.4 Build 020240119.
BDU:2024-02563
Уязвимость микропрограммного обеспечения коммутатора TP-Link Omada er605, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-25139 In TP-Link Omada er605 1.0.1 through (v2.6) 2.2.3, a cloud-brd binary is susceptible to an integer overflow that leads to a heap-based buffer overflow. After heap shaping, an attacker can achieve code execution in the context of the cloud-brd binary that runs at the root level. This is fixed in ER605(UN)_v2_2.2.4 Build 020240119. | CVSS3: 10 | 0% Низкий | почти 2 года назад | |
GHSA-xhjf-xjwg-rm34 In TP-Link Omada er605 1.0.1 through (v2.6) 2.2.3, a cloud-brd binary is susceptible to an integer overflow that leads to a heap-based buffer overflow. After heap shaping, an attacker can achieve code execution in the context of the cloud-brd binary that runs at the root level. This is fixed in ER605(UN)_v2_2.2.4 Build 020240119. | CVSS3: 10 | 0% Низкий | почти 2 года назад | |
BDU:2024-02563 Уязвимость микропрограммного обеспечения коммутатора TP-Link Omada er605, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.3 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу