CVE-2021-26621

An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netu:mex01_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netu:mex01:-:*:*:*:*:*:*:*

History

31 Mar 2022, 13:42

Type Values Removed Values Added
References (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 - (MISC) https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66579 - Third Party Advisory
CPE cpe:2.3:h:netu:mex01:-:*:*:*:*:*:*:*
cpe:2.3:o:netu:mex01_firmware:*:*:*:*:*:*:*:*
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
First Time Netu mex01
Netu mex01 Firmware
Netu

25 Mar 2022, 19:44

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-25 19:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-26621

Mitre link : CVE-2021-26621

CVE.ORG link : CVE-2021-26621


JSON object : View

Products Affected

netu

  • mex01_firmware
  • mex01
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')