A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-137-01 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-17T04:00:19.444Z
Reserved: 2022-05-10T00:00:00
Link: CVE-2022-1669

No data.

Status : Modified
Published: 2022-05-24T18:15:08.353
Modified: 2024-11-21T06:41:13.163
Link: CVE-2022-1669

No data.