Tasmota before commit 066878da4d4762a9b6cb169fdf353e804d735cfd was discovered to contain a stack overflow via the ClientPortPtr parameter at lib/libesp32/rtsp/CRtspSession.cpp.
References
Link | Resource |
---|---|
https://github.com/arendst/Tasmota/pull/16802 | Patch Third Party Advisory |
https://github.com/arendst/Tasmota/pull/16802/commits/066878da4d4762a9b6cb169fdf353e804d735cfd | Patch Third Party Advisory |
https://github.com/arendst/Tasmota/pull/16802 | Patch Third Party Advisory |
https://github.com/arendst/Tasmota/pull/16802/commits/066878da4d4762a9b6cb169fdf353e804d735cfd | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/arendst/Tasmota/pull/16802 - Patch, Third Party Advisory | |
References | () https://github.com/arendst/Tasmota/pull/16802/commits/066878da4d4762a9b6cb169fdf353e804d735cfd - Patch, Third Party Advisory |
Information
Published : 2022-11-14 22:15
Updated : 2024-11-21 07:26
NVD link : CVE-2022-43294
Mitre link : CVE-2022-43294
CVE.ORG link : CVE-2022-43294
JSON object : View
Products Affected
tasmota_project
- tasmota
CWE
CWE-787
Out-of-bounds Write