### [CVE-2021-32457](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32457) ![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Home%20Network%20Security&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=iotcl%20Stack-Based%20Buffer%20Overflow&color=brighgreen) ### Description Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230 #### Github No PoCs found on GitHub currently.