Lucene search

K
prionPRIOn knowledge basePRION:CVE-2024-20336
HistoryMar 06, 2024 - 5:15 p.m.

Buffer overflow

2024-03-0617:15:00
PRIOn knowledge base
www.prio-n.com
10
cisco
small business
wireless aps
buffer overflow
vulnerability
web-based interface
remote attacker
administrative credentials
user-supplied input
http request
management interface
arbitrary code
root user
operating system
nvd

8.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the web-based user interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform buffer overflow attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.

8.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for PRION:CVE-2024-20336