IP-COM EW9 V15.11.0.14(9732) was discovered to contain a buffer overflow in the formSetDebugCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
References
Link | Resource |
---|---|
https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/1_bof.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
31 Oct 2022, 18:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:h:ip-com:ew9:-:*:*:*:*:*:*:* cpe:2.3:o:ip-com:ew9_firmware:15.11.0.14:*:*:*:*:*:*:* |
|
First Time |
Ip-com ew9 Firmware
Ip-com Ip-com ew9 |
|
References | (MISC) https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/1_bof.md - Exploit, Third Party Advisory |
27 Oct 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-27 18:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-43365
Mitre link : CVE-2022-43365
CVE.ORG link : CVE-2022-43365
JSON object : View
Products Affected
ip-com
- ew9
- ew9_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')