The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
References
Link | Resource |
---|---|
http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-10-15 09:15
Updated : 2020-10-26 14:25
NVD link : CVE-2020-25858
Mitre link : CVE-2020-25858
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
qualcomm
- qualcomm_mobile_access_point