cve/2024/CVE-2024-6199.md
2025-09-29 21:09:30 +02:00

23 lines
1.2 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-6199](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6199)
![](https://img.shields.io/static/v1?label=Product&message=EG1000&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=EG1020&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RG1100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RM5110&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=RM5111&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brightgreen)
### Description
An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/fkie-cad/nvd-json-data-feeds