CVE-2022-39067

There is a buffer overflow vulnerability in ZTE MF286R. Due to lack of input validation on parameters of the wifi interface, an authenticated attacker could use the vulnerability to perform a denial of service attack.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zte:mf286r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zte:mf286r:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784 - Vendor Advisory () https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784 - Vendor Advisory

30 Nov 2022, 13:38

Type Values Removed Values Added
References (MISC) https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784 - (MISC) https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-120
CPE cpe:2.3:h:zte:mf286r:-:*:*:*:*:*:*:*
cpe:2.3:o:zte:mf286r_firmware:*:*:*:*:*:*:*:*

22 Nov 2022, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-22 17:15

Updated : 2025-04-29 05:15


NVD link : CVE-2022-39067

Mitre link : CVE-2022-39067

CVE.ORG link : CVE-2022-39067


JSON object : View

Products Affected

zte

  • mf286r_firmware
  • mf286r
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')