![]() ![]() ![]() ![]() Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 was discovered to contain a buffer overflow via the ApCliEncrypType parameter at /apply.cgi.Īpp/Controller/AuditLogsController.php in MISP before 2.4.182 mishandles ACLs for audit logs. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. The identifier of this vulnerability is VDB-248268. The exploit has been disclosed to the public and may be used. It is possible to launch the attack remotely. The manipulation of the argument flag with the input ie8 leads to buffer overflow. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. EuroTel ET元100 versions v01c01 and v01x37 does not limit the number of attempts to guess administrative credentials in remote password attacks to gain full control of the system.Ī vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |