CVE-2021-26621

An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netu:mex01_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netu:mex01:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:56

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 8.1
References () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 - Third Party Advisory () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 - Third Party Advisory

Information

Published : 2022-03-25 19:15

Updated : 2024-11-21 05:56


NVD link : CVE-2021-26621

Mitre link : CVE-2021-26621

CVE.ORG link : CVE-2021-26621


JSON object : View

Products Affected

netu

  • mex01
  • mex01_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')