cve/2024/CVE-2024-6199.md

23 lines
1.2 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-6199](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6199)
![](https://img.shields.io/static/v1?label=Product&message=EG1000&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=EG1020&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RG1100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RM5110&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RM5111&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brightgreen)
### Description
An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/fkie-cad/nvd-json-data-feeds