A vulnerability in the management interface of MiVoice Business through 9.3 PR1 and MiVoice Business Express through 8.0 SP3 PR3 could allow an unauthenticated attacker (that has network access to the management interface) to conduct a buffer overflow attack due to insufficient validation of URL parameters. A successful exploit could allow arbitrary code execution.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.mitel.com/support/security-advisories | Vendor Advisory | 
| https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0005 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2022-06-17 06:15
Updated : 2022-06-29 21:02
NVD link : CVE-2022-31784
Mitre link : CVE-2022-31784
JSON object : View
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
                mitel
- mivoice_business
 - mivoice_business_express
 


