CVE-2022-27255

In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:realtek:ecos_rsdk_firmware:1.5.7p1:*:*:*:*:*:*:*
cpe:2.3:h:realtek:ecos_rsdk:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:realtek:ecos_msdk_firmware:4.9.4p1:*:*:*:*:*:*:*
cpe:2.3:h:realtek:ecos_msdk:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:55

Type Values Removed Values Added
References () https://forum.defcon.org/node/241835 - Third Party Advisory () https://forum.defcon.org/node/241835 - Third Party Advisory
References () https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2022-27255.pdf - Vendor Advisory () https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2022-27255.pdf - Vendor Advisory

Information

Published : 2022-08-01 12:15

Updated : 2024-11-21 06:55


NVD link : CVE-2022-27255

Mitre link : CVE-2022-27255

CVE.ORG link : CVE-2022-27255


JSON object : View

Products Affected

realtek

  • ecos_rsdk
  • ecos_rsdk_firmware
  • ecos_msdk_firmware
  • ecos_msdk
CWE
CWE-20

Improper Input Validation