In Weintek's cMT3000 HMI Web CGI device, a stack-based buffer overflow in cgi-bin codesys.cgi can allow an attacker to bypass login authentication
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | Stack overflow | 19 Oct 202320:15 | β | prion |
![]() | CVE-2023-43492 Weintek cMT3000 HMI Web CGI Stack-based Buffer Overflow | 19 Oct 202319:28 | β | vulnrichment |
![]() | CVE-2023-43492 Weintek cMT3000 HMI Web CGI Stack-based Buffer Overflow | 19 Oct 202319:28 | β | cvelist |
![]() | CVE-2023-43492 | 19 Oct 202320:15 | β | nvd |
![]() | Weintek cMT3000 HMI Web CGI | 12 Oct 202306:00 | β | ics |
[
{
"defaultStatus": "unaffected",
"product": "cMT-FHD",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210210 ",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "cMT-HDM",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210204 ",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "cMT3071",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210218",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "cMT3072",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210218",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "cMT3103",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210218",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "cMT3090",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210218",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "cMT3151",
"vendor": "Weintek",
"versions": [
{
"lessThanOrEqual": "20210218",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo