CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
17.4%
Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the interfacename
request’s parameter.
Vendor | Product | Version | CPE |
---|---|---|---|
realtek | rtl819x_jungle_software_development_kit | 3.4.11 | cpe:2.3:a:realtek:rtl819x_jungle_software_development_kit:3.4.11:*:*:*:*:*:*:* |
level1 | wbr-6013_firmware | rer4_a_v3411b_2t2r_lev_09_170623 | cpe:2.3:o:level1:wbr-6013_firmware:rer4_a_v3411b_2t2r_lev_09_170623:*:*:*:*:*:*:* |
level1 | wbr-6013 | - | cpe:2.3:h:level1:wbr-6013:-:*:*:*:*:*:*:* |
[
{
"vendor": "LevelOne",
"product": "WBR-6013",
"versions": [
{
"version": "RER4_A_v3411b_2T2R_LEV_09_170623",
"status": "affected"
}
]
},
{
"vendor": "Realtek",
"product": "rtl819x Jungle SDK",
"versions": [
{
"version": "v3.4.11",
"status": "affected"
}
]
}
]