An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.
References
Link | Resource |
---|---|
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
31 Mar 2022, 13:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
References | (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 - Third Party Advisory | |
CPE | cpe:2.3:h:netu:mex01:-:*:*:*:*:*:*:* cpe:2.3:o:netu:mex01_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
25 Mar 2022, 19:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-25 19:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-26621
Mitre link : CVE-2021-26621
CVE.ORG link : CVE-2021-26621
JSON object : View
Products Affected
netu
- mex01_firmware
- mex01
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')