Lucene search

K
cve[email protected]CVE-2023-41028
HistoryAug 23, 2023 - 10:15 p.m.

CVE-2023-41028

2023-08-2322:15:09
CWE-787
CWE-121
web.nvd.nist.gov
26
cve-2023-41028
stack-based buffer overflow
juplink rx4-1500
wifi router
code execution
root access
nvd

9 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.7%

A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root.

Affected configurations

NVD
Node
juplinkrx4-1500Match-
AND
juplinkrx4-1500_firmwareRange1.0.21.0.5

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "RX4-1500",
    "vendor": "Juplink",
    "versions": [
      {
        "lessThanOrEqual": "V1.0.5",
        "status": "affected",
        "version": "V1.0.2",
        "versionType": "custom"
      }
    ]
  }
]

9 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.7%

Related for CVE-2023-41028