An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.
References
Link | Resource |
---|---|
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 | Third Party Advisory |
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 8.1 |
References | () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 - Third Party Advisory |
Information
Published : 2022-03-25 19:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26621
Mitre link : CVE-2021-26621
CVE.ORG link : CVE-2021-26621
JSON object : View
Products Affected
netu
- mex01
- mex01_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')