mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
27 lines
1.2 KiB
Markdown
27 lines
1.2 KiB
Markdown
![]() |
### [CVE-2015-3036](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3036)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html
|
||
|
- http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html
|
||
|
- http://seclists.org/fulldisclosure/2015/May/74
|
||
|
- http://www.kb.cert.org/vuls/id/177092
|
||
|
- https://www.exploit-db.com/exploits/38454/
|
||
|
- https://www.exploit-db.com/exploits/38566/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Leproide/TD-W8970-NetUSB-Fix-v1-
|
||
|
- https://github.com/funsecurity/NetUSB-exploit
|
||
|
- https://github.com/odolezal/D-Link-DIR-655
|
||
|
- https://github.com/pandazheng/MiraiSecurity
|
||
|
|