- Description
- Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_bandwidth` POST parameter.
- Source
- talos-cna@cisco.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- talos-cna@cisco.com
- CWE-120
- Hype score
- Not currently trending
CVE-2024-39801 Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can … https://t.co/oJ4ziOxIgW
@CVEnew
18 Jan 2025
472 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-39801: CRITICAL] Buffer overflow vulnerabilities found in Wavlink AC3000 M33A8.V5030.210505: Attackers can exploit 'qos.cgi' and 'qos_bandwidth' for stack-based overflow via crafted HTTP requests.#cybersecurity,#vulnerability https://t.co/6Mmwuym9oy https://t.co/TXM5Zjh
@CveFindCom
14 Jan 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes