Lucene search

K
OpenndsOpennds

7 matches found

CVE
CVE
added 2024/02/26 4:27 p.m.6659 views

CVE-2024-25763

openNDS 10.2.0 is vulnerable to Use-After-Free via /openNDS/src/auth.c.

5.5CVSS6.7AI score0.00176EPSS
CVE
CVE
added 2023/11/17 6:15 a.m.57 views

CVE-2023-41101

An issue was discovered in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in versions 9.x and earlier, and to a heap-based buffer overflow in versions 1...

9.8CVSS10AI score0.04088EPSS
CVE
CVE
added 2023/11/17 6:15 a.m.42 views

CVE-2023-41102

An issue was discovered in the captive portal in OpenNDS before version 10.1.3. It has multiple memory leaks due to not freeing up allocated memory. This may lead to a Denial-of-Service condition due to the consumption of all available memory. Affected OpenNDS before version 10.1.3 fixed in OpenWrt...

7.5CVSS7.5AI score0.00069EPSS
CVE
CVE
added 2024/01/26 5:15 a.m.38 views

CVE-2023-38318

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

9.8CVSS9.6AI score0.00241EPSS
CVE
CVE
added 2024/01/26 5:15 a.m.33 views

CVE-2023-38317

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the network interface name entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

9.8CVSS9.6AI score0.00241EPSS
CVE
CVE
added 2024/01/26 5:15 a.m.33 views

CVE-2023-38319

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the FAS key entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

9.8CVSS9.6AI score0.00241EPSS
CVE
CVE
added 2024/01/26 5:15 a.m.30 views

CVE-2023-38323

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

9.8CVSS9.6AI score0.00241EPSS