CVE-2022-30904

In Bestechnic Bluetooth Mesh SDK (BES2300) V1.0, a buffer overflow vulnerability can be triggered during provisioning, because there is no check for the SegN field of the Transaction Start PDU.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:bestechnic:bluetooth_mesh_software_development_kit:1.0:*:*:*:*:*:*:*
cpe:2.3:h:bestechnic:bes2300:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.2
References () https://docs.google.com/document/d/1is3dYwMcRIkhjvujzi5OgnaGBsQVtlew/edit - Exploit, Third Party Advisory () https://docs.google.com/document/d/1is3dYwMcRIkhjvujzi5OgnaGBsQVtlew/edit - Exploit, Third Party Advisory

Information

Published : 2023-02-01 21:15

Updated : 2024-11-21 07:03


NVD link : CVE-2022-30904

Mitre link : CVE-2022-30904

CVE.ORG link : CVE-2022-30904


JSON object : View

Products Affected

bestechnic

  • bes2300
  • bluetooth_mesh_software_development_kit
CWE
CWE-787

Out-of-bounds Write