目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2017-8335— Securifi Almond 缓冲区错误漏洞

EPSS 1.30% · P80
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2017-8335 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of setting name for wireless network. These values are stored by the device in NVRAM (Non-volatile RAM). It seems that the POST parameters passed in this request to set up names on the device do not have a string length check on them. This allows an attacker to send a large payload in the "mssid_1" POST parameter. The device also allows a user to view the name of the Wifi Network set by the user. While processing this request, the device calls a function named "getCfgToHTML" at address 0x004268A8 which retrieves the value set earlier by "mssid_1" parameter as SSID2 and this value then results in overflowing the stack set up for this function and allows an attacker to control $ra register value on the stack which allows an attacker to control the device by executing a payload of an attacker's choice. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that recieves the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_00420F38 in IDA pro is identified to be receiving the values sent in the POST parameter "mssid_1" at address 0x0042BA00 and then sets in the NVRAM at address 0x0042C314. The value is later retrieved in the function "getCfgToHTML" at address 0x00426924 and this results in overflowing the buffer due to "strcat" function that is utilized by this function.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Securifi Almond 缓冲区错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Securifi Almond是一款带有触控屏幕的无线路由器。 使用AL-R096版本固件的Securifi Almond、Almond+和Almond 2015中的getCfgToHTML存在缓冲区溢出漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
-n/a n/a -

二、漏洞 CVE-2017-8335 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2017-8335 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · n/a · 2019-06-18 · 共 39 条

CVE-2019-12872dotCMS SQL注入漏洞
CVE-2018-18837Netdata Web application 注入漏洞
CVE-2018-18838Netdata Web application 注入漏洞
CVE-2018-18839Netdata Web application 信息泄露漏洞
CVE-2018-18852CERIO DT-300N 操作系统命令注入漏洞
CVE-2018-18875Columbia Weather Systems Weather MicroServer 跨站脚本漏洞
CVE-2018-18876Columbia Weather Systems Weather MicroServer 路径遍历漏洞
CVE-2018-18877Columbia Weather Systems Weather MicroServer 授权问题漏洞
CVE-2018-18878Columbia Weather Systems Weather MicroServer 输入验证错误漏洞
CVE-2018-18879Columbia Weather Systems Weather MicroServer 代码注入漏洞
CVE-2018-18836Netdata Web application 代码注入漏洞
CVE-2018-18880Columbia Weather Systems Weather MicroServer 跨站脚本漏洞
CVE-2018-18886Helpy 跨站脚本漏洞
CVE-2018-18944Artha 缓冲区错误漏洞
CVE-2018-20013UrBackup 输入验证错误漏洞
CVE-2019-6965Synetics i-doit 跨站脚本漏洞
CVE-2019-7159Open-Xchange OX App Suite 信息泄露漏洞
CVE-2019-10998Phoenix Contact PLCNext AXC F 2152 授权问题漏洞
CVE-2019-12823Pixel&tonic Craft CMS 跨站脚本漏洞
CVE-2017-8328Securifi Almond 跨站请求伪造漏洞

显示前 20 条,共 39 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-8335

暂无评论


发表评论