### [CVE-2019-10623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10623) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Integer%20Overflow%20to%20Buffer%20Overflow%20in%20WLAN%20Host&color=brighgreen) ### Description Possible integer overflow can happen in host driver while processing user controlled string due to improper validation on data received. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCN7605, QCS605, Rennell, SC8180X, SDA845, SDM710, SDX24, SDX55, SM7150, SM8150, SM8250, SXR2130 ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin #### Github No PoCs found on GitHub currently.