Vulnerability Description
libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwrt | Openwrt | >= 18.06.0, < 18.06.7 |
Related Weaknesses (CWE)
References
- https://github.com/openwrt/openwrt/commits/masterPatchThird Party Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2020-7248#range-4512438Third Party AdvisoryUS Government Resource
- https://openwrt.org/advisory/2020-01-31-2Vendor Advisory
- https://openwrt.org/advisory/2020-01-31-2Vendor Advisory
- https://github.com/openwrt/openwrt/commits/masterPatchThird Party Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2020-7248#range-4512438Third Party AdvisoryUS Government Resource
- https://openwrt.org/advisory/2020-01-31-2Vendor Advisory
- https://openwrt.org/advisory/2020-01-31-2Vendor Advisory
FAQ
What is CVE-2020-7248?
CVE-2020-7248 is a vulnerability with a CVSS score of 7.5 (HIGH). libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.
How severe is CVE-2020-7248?
CVE-2020-7248 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7248?
Check the references section above for vendor advisories and patch information. Affected products include: Openwrt Openwrt.