Vulnerability Description
On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP "Authorization: Basic" header that is mishandled by user_auth->user_ok in /bin/boa.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netis-Systems | Wf2411 Firmware | 2.1.36123 |
| Netis-Systems | Wf2411 | - |
| Netis-Systems | Wf2880 Firmware | 2.1.36123 |
| Netis-Systems | Wf2880 | - |
Related Weaknesses (CWE)
References
- https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20oExploitVendor Advisory
- https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20oExploitVendor Advisory
FAQ
What is CVE-2019-8985?
CVE-2019-8985 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause den...
How severe is CVE-2019-8985?
CVE-2019-8985 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-8985?
Check the references section above for vendor advisories and patch information. Affected products include: Netis-Systems Wf2411 Firmware, Netis-Systems Wf2411, Netis-Systems Wf2880 Firmware, Netis-Systems Wf2880.