Vulnerability Description
Buffer overflow vulnerability in Nintendo Wi-Fi Network Adaptor WAP-001 All versions allows an attacker with an administrative privilege to execute arbitrary code via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nintendo | Wi-Fi Network Adaptor Wap 001 Firmware | All versions |
| Nintendo | Wi-Fi Network Adaptor Wap 001 | - |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN17625382/index.htmlThird Party Advisory
- https://www.nintendo.co.jp/support/information/2022/0720.htmlVendor Advisory
- https://jvn.jp/en/jp/JVN17625382/index.htmlThird Party Advisory
- https://www.nintendo.co.jp/support/information/2022/0720.htmlVendor Advisory
FAQ
What is CVE-2022-36293?
CVE-2022-36293 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow vulnerability in Nintendo Wi-Fi Network Adaptor WAP-001 All versions allows an attacker with an administrative privilege to execute arbitrary code via unspecified vectors.
How severe is CVE-2022-36293?
CVE-2022-36293 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36293?
Check the references section above for vendor advisories and patch information. Affected products include: Nintendo Wi-Fi Network Adaptor Wap 001 Firmware, Nintendo Wi-Fi Network Adaptor Wap 001.