Lucene search

K
zdiDmitry "InfoSecDJ" Janushkevich of Trend Micro Zero Day InitiativeZDI-24-672
HistoryJun 13, 2024 - 12:00 a.m.

(0Day) Deep Sea Electronics DSE855 Multipart Boundary Stack-Based Buffer Overflow Remote Code Execution Vulnerability

2024-06-1300:00:00
Dmitry "InfoSecDJ" Janushkevich of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
7
remote code execution
network-adjacent
authentication not required
multipart boundaries
user-supplied data
stack-based buffer

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

28.8%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of multipart boundaries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

28.8%

Related for ZDI-24-672