On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP "Authorization: Basic" header that is mishandled by user_auth->user_ok in /bin/boa.
References
Link | Resource |
---|---|
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md | Exploit Vendor Advisory |
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 04:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md - Exploit, Vendor Advisory |
Information
Published : 2019-02-21 19:29
Updated : 2024-11-21 04:50
NVD link : CVE-2019-8985
Mitre link : CVE-2019-8985
CVE.ORG link : CVE-2019-8985
JSON object : View
Products Affected
netis-systems
- wf2880
- wf2411_firmware
- wf2880_firmware
- wf2411