mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
67 lines
2.4 KiB
JSON
67 lines
2.4 KiB
JSON
{
|
|
"id": "CVE-2024-54809",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2025-03-31T21:15:48.527",
|
|
"lastModified": "2025-04-02T14:15:46.023",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"tags": [
|
|
"unsupported-when-assigned"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Netgear Inc WNR854T 1.5.2 (Norteam\u00e9rica) presenta una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n parse_st_header debido al uso de un par\u00e1metro de encabezado de solicitud en un strncpy donde el tama\u00f1o se determina en funci\u00f3n de la entrada especificada. Al enviar un paquete especialmente manipulado, un atacante puede tomar el control del contador del programa y secuestrar el flujo de control del programa para ejecutar comandos arbitrarios del sistema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-121"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |