Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow. An attacker can supply a string in the page parameter for reboot.asp endpoint, allowing him to force an overflow when the string is concatenated to the HTML body.
References
Link | Resource |
---|---|
https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md | Exploit Third Party Advisory |
https://hub.digi.com/dp/path=/support/asset/digi-passport-1.5.2-firmware-release-notes/ | Release Notes Vendor Advisory |
https://hub.digi.com/support/products/infrastructure-management/digi-passport/ | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-04-05 18:15
Updated : 2022-04-12 12:31
NVD link : CVE-2022-26953
Mitre link : CVE-2022-26953
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
digi
- passport_firmware
- passport