Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `interfacename` request's parameter.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1893 | Exploit Third Party Advisory |
Configurations
History
11 Jul 2024, 15:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
CPE | cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:* cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:* cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:* |
|
First Time |
Level1
Level1 wbr-6013 Firmware Level1 wbr-6013 Realtek rtl819x Jungle Software Development Kit Realtek |
|
Summary |
|
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1893 - Exploit, Third Party Advisory |
08 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-08 16:15
Updated : 2024-07-11 15:59
NVD link : CVE-2023-50239
Mitre link : CVE-2023-50239
CVE.ORG link : CVE-2023-50239
JSON object : View
Products Affected
level1
- wbr-6013
- wbr-6013_firmware
realtek
- rtl819x_jungle_software_development_kit