Show filters
2,405 Total Results
Displaying 281-290 of 2,405
Sort by:
Attacker Value
Unknown
CVE-2023-50243
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
Two stack-based buffer overflow vulnerabilities exist in the boa formIpQoS functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `comment` request's parameter.
0
Attacker Value
Unknown
CVE-2023-50240
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `AdvDefaultPreference` request's parameter.
0
Attacker Value
Unknown
CVE-2023-50239
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `interfacename` request's parameter.
0
Attacker Value
Unknown
CVE-2023-49867
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-49595
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the boa rollback_control_code functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-49073
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the boa formFilter functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-48270
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the boa formDnsv6 functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-47856
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the boa set_RadvdPrefixParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-47677
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
A cross-site request forgery (csrf) vulnerability exists in the boa CSRF protection functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network request can lead to CSRF. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-45742
Disclosure Date: July 08, 2024 (last updated February 26, 2025)
An integer overflow vulnerability exists in the boa updateConfigIntoFlash functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary code execution. An attacker can send a sequence of requests to trigger this vulnerability.
0