In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
References
Link | Resource |
---|---|
https://forum.defcon.org/node/241835 | Third Party Advisory |
https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2022-27255.pdf | Vendor Advisory |
https://forum.defcon.org/node/241835 | Third Party Advisory |
https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2022-27255.pdf | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://forum.defcon.org/node/241835 - Third Party Advisory | |
References | () https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2022-27255.pdf - Vendor Advisory |
Information
Published : 2022-08-01 12:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27255
Mitre link : CVE-2022-27255
CVE.ORG link : CVE-2022-27255
JSON object : View
Products Affected
realtek
- ecos_rsdk
- ecos_rsdk_firmware
- ecos_msdk_firmware
- ecos_msdk
CWE
CWE-20
Improper Input Validation