The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
References
Link | Resource |
---|---|
http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities | Exploit Third Party Advisory |
http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2020-10-15 16:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25858
Mitre link : CVE-2020-25858
CVE.ORG link : CVE-2020-25858
JSON object : View
Products Affected
qualcomm
- qualcomm_mobile_access_point
CWE
CWE-476
NULL Pointer Dereference