Vulnerability Description
A stack-based buffer overflow vulnerability exists in the boa rollback_control_code functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtek | Rtl819X Jungle Software Development Kit | 3.4.11 |
| Level1 | Wbr-6013 Firmware | rer4_a_v3411b_2t2r_lev_09_170623 |
| Level1 | Wbr-6013 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1878Third Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1878Third Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1878
FAQ
What is CVE-2023-49595?
CVE-2023-49595 is a vulnerability with a CVSS score of 7.2 (HIGH). A stack-based buffer overflow vulnerability exists in the boa rollback_control_code functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbi...
How severe is CVE-2023-49595?
CVE-2023-49595 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49595?
Check the references section above for vendor advisories and patch information. Affected products include: Realtek Rtl819X Jungle Software Development Kit, Level1 Wbr-6013 Firmware, Level1 Wbr-6013.