Lucene search

K

Ip150 Firmware Security Vulnerabilities

cve
cve

CVE-2020-25185

The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).

8.8CVSS

8.8AI Score

0.001EPSS

2020-11-21 06:15 AM
68
2
cve
cve

CVE-2020-25189

The affected product is vulnerable to three stack-based buffer overflows, which may allow an unauthenticated attacker to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).

9.8CVSS

9.7AI Score

0.005EPSS

2020-11-21 05:15 PM
54
2