CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
86.0%
Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 9924SP, CentreCOM 9924T/4SP, Rapier 48i, and SwitchBlade4000 with firmware before 2.9.1-21 allows remote attackers to execute arbitrary code via a crafted HTTP POST request.
Vendor | Product | Version | CPE |
---|---|---|---|
alliedtelesis | centrecom_ar415s_firmware | * | cpe:2.3:o:alliedtelesis:centrecom_ar415s_firmware:*:*:*:*:*:*:*:* |
alliedtelesis | centrecom_ar415s | * | cpe:2.3:h:alliedtelesis:centrecom_ar415s:*:*:*:*:*:*:*:* |
alliedtelesis | at-8624t\/2m_firmware | * | cpe:2.3:o:alliedtelesis:at-8624t\/2m_firmware:*:*:*:*:*:*:*:* |
alliedtelesis | at-8624t\/2m | * | cpe:2.3:h:alliedtelesis:at-8624t\/2m:*:*:*:*:*:*:*:* |
alliedtelesis | ar442s_firmware | * | cpe:2.3:o:alliedtelesis:ar442s_firmware:*:*:*:*:*:*:*:* |
alliedtelesis | ar442s | - | cpe:2.3:h:alliedtelesis:ar442s:-:*:*:*:*:*:*:* |
alliedtelesis | at-9924t_firmware | * | cpe:2.3:o:alliedtelesis:at-9924t_firmware:*:*:*:*:*:*:*:* |
alliedtelesis | at-9924t | * | cpe:2.3:h:alliedtelesis:at-9924t:*:*:*:*:*:*:*:* |
alliedtelesis | at-8848_firmware | * | cpe:2.3:o:alliedtelesis:at-8848_firmware:*:*:*:*:*:*:*:* |
alliedtelesis | at-8848 | * | cpe:2.3:h:alliedtelesis:at-8848:*:*:*:*:*:*:*:* |