mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
25 lines
1.1 KiB
JSON
25 lines
1.1 KiB
JSON
{
|
|
"id": "CVE-2024-39181",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-07-09T21:15:15.403",
|
|
"lastModified": "2024-07-11T13:05:54.930",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 was discovered to contain a buffer overflow via the ApCliSsid parameter in thegenerate_conf_router() function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 que Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro ApCliSsid en la funci\u00f3n generar_conf_router(). Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/SunsetR/Vulnerability-information/blob/main/LBT-T300-T400_ApCliSsid_Buffer%20overflow.md",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |