CVE-2014-0355
Published Apr 15, 2014
Last updated 11 years ago
Overview
- Description
- Multiple stack-based buffer overflows on the ZyXEL Wireless N300 NetUSB NBG-419N router with firmware 1.00(BFQ.6)C0 allow man-in-the-middle attackers to execute arbitrary code via (1) a long temp attribute in a yweather:condition element in a forecastrss file that is processed by the checkWeather function; the (2) WeatherCity or (3) WeatherDegree variable to the detectWeather function; unspecified input to the (4) UpnpAddRunRLQoS, (5) UpnpDeleteRunRLQoS, or (6) UpnpDeletePortCheckType function; or (7) the SET COUNTRY udps command.
- Source
- cret@cert.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.9
- Impact score
- 10
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:n300_netusb_nbg-419n_firmware:1.00\\(bfq_6\\)c0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29616BCA-61C1-4881-B491-B0473BDB9466" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:n300_netusb_nbg-419n:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83EB96CF-778F-4499-8779-0D8884F82FAD" } ], "operator": "OR" } ], "operator": "AND" } ]