** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 | Exploit Third Party Advisory |
https://winaprs.com/ | Vendor Advisory |
https://github.com/Coalfire-Research/WinAPRS-Exploits | Exploit Third Party Advisory |
https://news.ycombinator.com/item?id=31571476 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2022-06-02 07:15
Updated : 2022-06-10 11:39
NVD link : CVE-2022-24702
Mitre link : CVE-2022-24702
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
winaprs
- winaprs