Vulnerability Description
A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the function R7WebsSecurityHandler of the file /goform/wx3auth of the component POST Request Handler. The manipulation of the argument data results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ip-Com | W30Ap Firmware | <= 1.0.0.11\(1340\) |
| Ip-Com | W30Ap | 4.0 |
Related Weaknesses (CWE)
References
- https://gitee.com/GXB0_0/iot-vul/blob/master/IP-COM/W30AP/wx3auth-sprintf.mdExploitThird Party Advisory
- https://gitee.com/GXB0_0/iot-vul/blob/master/IP-COM/W30AP/wx3auth-sprintf.md#pocExploitThird Party Advisory
- https://vuldb.com/?ctiid.344599Permissions RequiredVDB Entry
- https://vuldb.com/?id.344599Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.744062Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.744063Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2017?
CVE-2026-2017 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the function R7WebsSecurityHandler of the file /goform/wx3auth of the component POST Request Handler. The m...
How severe is CVE-2026-2017?
CVE-2026-2017 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-2017?
Check the references section above for vendor advisories and patch information. Affected products include: Ip-Com W30Ap Firmware, Ip-Com W30Ap.