- Description
- Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter.
- Source
- talos-cna@cisco.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- talos-cna@cisco.com
- CWE-120
- Hype score
- Not currently trending
CVE-2024-39803 Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can … https://t.co/fL2OyJfhcH
@CVEnew
14 Jan 2025
450 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-39803: CRITICAL] Buffer overflow vulnerabilities discovered in Wavlink AC3000 M33A8.V5030.210505 firmware can be exploited via crafted HTTP requests, enabling attackers to trigger stack-based overflows.#cybersecurity,#vulnerability https://t.co/PTUl3Zky55 https://t.co/F
@CveFindCom
14 Jan 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes