Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rtl819x_jungle_software_development_kit
(Realtek)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 19 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-07-08 | CVE-2023-50240 | Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `AdvDefaultPreference` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50239 | Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `interfacename` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50243 | Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `comment` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50244 | Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `entry_name` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50330 | A stack-based buffer overflow vulnerability exists in the boa getInfo functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger this vulnerability. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50381 | Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `targetAPSsid` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50382 | Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `peerPin` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2023-50383 | Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `localPin` request's parameter. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 | ||
2024-07-08 | CVE-2024-21778 | A heap-based buffer overflow vulnerability exists in the configuration file mib_init_value_array functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted .dat file can lead to arbitrary code execution. An attacker can upload a malicious file to trigger this vulnerability. | Wbr\-6013_firmware, Rtl819x_jungle_software_development_kit | 7.2 |