Description
The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution.
Problem types
Product status
v1.305b210531
Credits
Tomer Goldschmidt of Claroty Research - Team82 reported this vulnerability to CISA.
References
www.cisa.gov/news-events/ics-advisories/icsa-24-340-02
www.planet.com.tw/...ds?method=keyword&keyword=v1.305b241111