On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP "Authorization: Basic" header that is mishandled by user_auth->user_ok in /bin/boa.
References
| Link | Resource |
|---|---|
| https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md | Exploit Vendor Advisory |
| https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 04:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md - Exploit, Vendor Advisory |
Information
Published : 2019-02-21 19:29
Updated : 2024-11-21 04:50
NVD link : CVE-2019-8985
Mitre link : CVE-2019-8985
CVE.ORG link : CVE-2019-8985
JSON object : View
Products Affected
netis-systems
- wf2880
- wf2411
- wf2411_firmware
- wf2880_firmware
