CVE-2023-52162

Mercusys MW325R EU V3 (Firmware MW325R(EU)_V3_1.11.0 Build 221019) is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code. Exploiting the vulnerability requires authentication.
Configurations

No configuration.

History

21 Nov 2024, 08:39

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/mercusys-mw325r-reverse-engineering-part-3-authenticated-remote-code-execution-cve-2023-52162 -
References () https://k4m1ll0.com/cve-2023-52162.html - () https://k4m1ll0.com/cve-2023-52162.html -

03 Jul 2024, 01:43

Type Values Removed Values Added
CWE CWE-121
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7

04 Jun 2024, 16:57

Type Values Removed Values Added
Summary
  • (es) Mercusys MW325R EU V3 (Firmware MW325R(EU)_V3_1.11.0 Build 221019) es vulnerable a un desbordamiento del búfer basado en pila, lo que podría permitir a un atacante ejecutar código arbitrario. Explotar la vulnerabilidad requiere autenticación.

03 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-03 20:15

Updated : 2024-11-21 08:39


NVD link : CVE-2023-52162

Mitre link : CVE-2023-52162

CVE.ORG link : CVE-2023-52162


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow