cve/2019/CVE-2019-8985.md

20 lines
987 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-8985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8985)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP "Authorization: Basic" header that is mishandled by user_auth->user_ok in /bin/boa.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/IamAlch3mist/Awesome-Embedded-Systems-Vulnerability-Research
- https://github.com/Squirre17/CVE-2019-8985