Vulnerability Description
Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `entry_name` request's parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtek | Rtl819X Jungle Software Development Kit | 3.4.11 |
| Level1 | Wbr-6013 Firmware | rer4_a_v3411b_2t2r_lev_09_170623 |
| Level1 | Wbr-6013 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1895ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1895ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1895
FAQ
What is CVE-2023-50244?
CVE-2023-50244 is a vulnerability with a CVSS score of 7.2 (HIGH). Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code exec...
How severe is CVE-2023-50244?
CVE-2023-50244 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-50244?
Check the references section above for vendor advisories and patch information. Affected products include: Realtek Rtl819X Jungle Software Development Kit, Level1 Wbr-6013 Firmware, Level1 Wbr-6013.