Vulnerability Description
A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fastcom | Fw300R Firmware | 1.3.13_build_141023_rel.61347n |
| Fastcom | Fw300R | - |
Related Weaknesses (CWE)
References
- https://gist.github.com/Giles-one/834b2becd7abebc3cabea0484301d149Third Party Advisory
- https://github.com/Giles-one/FW300RouterCrack/Exploit
- https://www.fastcom.com.cn/product-8.htmlProduct
FAQ
What is CVE-2024-41285?
CVE-2024-41285 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.
How severe is CVE-2024-41285?
CVE-2024-41285 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-41285?
Check the references section above for vendor advisories and patch information. Affected products include: Fastcom Fw300R Firmware, Fastcom Fw300R.