We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-48871

Planet Technology Planet WGS-804HPT Stack-based Buffer Overflow



Description

The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution.

Reserved 2024-12-02 | Published 2024-12-06 | Updated 2024-12-06 | Assigner icscert


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121

Product status

Default status
unaffected

v1.305b210531
affected

Credits

Tomer Goldschmidt of Claroty Research - Team82 reported this vulnerability to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-24-340-02

www.planet.com.tw/...ds?method=keyword&keyword=v1.305b241111

cve.org (CVE-2024-48871)

nvd.nist.gov (CVE-2024-48871)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-48871

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.