logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2022-41021

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2022-41021

Description:
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn l2tp advanced name WORD dns (yes|no) mtu <128-16384> mru <128-16384> auth (on|off) password (WORD|null) options WORD' command template.
Last updated date:
02/02/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/02/2023
Reference url to background

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy