The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Planet Technology Corp
Planet Technology Corp wgs-804hpt Firmware |
|
CPEs | cpe:2.3:o:planet_technology_corp:wgs-804hpt_firmware:1.305b210531:*:*:*:*:*:*:* | |
Vendors & Products |
Planet Technology Corp
Planet Technology Corp wgs-804hpt Firmware |
|
Metrics |
ssvc
|
Fri, 06 Dec 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution. | |
Title | Planet Technology Planet WGS-804HPT Stack-based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-12-06T20:29:05.846Z
Reserved: 2024-12-02T15:48:12.763Z
Link: CVE-2024-48871

Updated: 2024-12-06T19:23:23.785Z

Status : Received
Published: 2024-12-06T18:15:25.267
Modified: 2024-12-06T18:15:25.267
Link: CVE-2024-48871

No data.