CVE-2022-24702

An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link Resource
https://github.com/Coalfire-Research/WinAPRS-Exploits Exploit Third Party Advisory
https://news.ycombinator.com/item?id=31571476 Issue Tracking Third Party Advisory
https://winaprs.com/ Vendor Advisory
https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:winaprs:winaprs:2.9.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:44

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Information

Published : 2022-06-02 14:15

Updated : 2024-08-03 05:15


NVD link : CVE-2022-24702

Mitre link : CVE-2022-24702

CVE.ORG link : CVE-2022-24702


JSON object : View

Products Affected

winaprs

  • winaprs
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')