### [CVE-2007-6626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6626) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple buffer overflows in the RTSP_valid_response_msg function in RTSP_state_machine.c in LScube Feng 0.1.15 and earlier allow remote attackers to execute arbitrary code via (1) a long first line of a response, as demonstrated by a long VER line; or (2) a long second line of a response, as demonstrated by a message that follows a RETURN line. ### POC #### Reference - http://aluigi.altervista.org/adv/fengulo-adv.txt - http://aluigi.org/poc/fengulo.zip - http://securityreason.com/securityalert/3507 #### Github No PoCs found on GitHub currently.