Lucene search

K
nvd[email protected]NVD:CVE-2023-52162
HistoryJun 03, 2024 - 8:15 p.m.

CVE-2023-52162

2024-06-0320:15:08
CWE-121
web.nvd.nist.gov
1
mercusys mw325r eu
firmware vulnerability
stack-based buffer overflow
arbitrary code execution
authentication required

CVSS3

6.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L

AI Score

7.3

Confidence

High

Mercusys MW325R EU V3 (Firmware MW325R(EU)_V3_1.11.0 Build 221019) is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code. Exploiting the vulnerability requires authentication.

CVSS3

6.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L

AI Score

7.3

Confidence

High

Related for NVD:CVE-2023-52162