Home

Description

The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution.

PUBLISHED Reserved 2024-12-02 | Published 2024-12-06 | Updated 2024-12-06 | Assigner icscert




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121

Product status

Default status
unaffected

v1.305b210531
affected

Credits

Tomer Goldschmidt of Claroty Research - Team82 reported this vulnerability to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-24-340-02

www.planet.com.tw/...ds?method=keyword&keyword=v1.305b241111

cve.org (CVE-2024-48871)

nvd.nist.gov (CVE-2024-48871)

Download JSON