CVE-2022-1669

A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:circutor:compact_dc-s_basic_firmware:1.2.17:*:*:*:*:*:*:*
cpe:2.3:h:circutor:compact_dc-s_basic:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
CVSS v2 : 5.5
v3 : 8.1
v2 : 5.5
v3 : 6.8
References () https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01 - Third Party Advisory, US Government Resource

Information

Published : 2022-05-24 18:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1669

Mitre link : CVE-2022-1669

CVE.ORG link : CVE-2022-1669


JSON object : View

Products Affected

circutor

  • compact_dc-s_basic
  • compact_dc-s_basic_firmware
CWE
CWE-121

Stack-based Buffer Overflow