cve/2021/CVE-2021-32457.md

19 lines
1003 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-32457](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32457)
![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Home%20Network%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=iotcl%20Stack-Based%20Buffer%20Overflow&color=brighgreen)
### Description
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230
2024-06-09 00:33:16 +00:00
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.