Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn pptp advanced name WORD dns (yes|no) mtu <128-16384> mru <128-16384> mppe (on|off) stateful (on|off) options WORD' command template.
History

Mon, 31 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-03-31T18:31:33.886Z

Reserved: 2022-09-19T18:30:35.093Z

Link: CVE-2022-41025

cve-icon Vulnrichment

Updated: 2024-08-03T12:35:47.911Z

cve-icon NVD

Status : Modified

Published: 2023-01-26T22:15:22.783

Modified: 2024-11-21T07:22:28.170

Link: CVE-2022-41025

cve-icon Redhat

No data.