Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-6655— File parsing Out-Of-Bounds read remote code execution

CVSS 5.8 · Medium EPSS 0.82% · P74
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-6655

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
File parsing Out-Of-Bounds read remote code execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Eaton's easySoft software v7.xx prior to v7.22 are susceptible to Out-of-bounds remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user to upload the malformed .E70 file in the application. The vulnerability arises due to improper validation and parsing of the E70 file content by the application.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)
Vulnerability Title
Eaton Easysoft 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Eaton Easysoft是美国伊顿(Eaton)公司的一款应用于工业领域的编程应用。该软件用于用于对Easy控制器和显示器进行编程,可对电路图按照格式进行编辑和展示。 Eatons easySoft software v7.20 存在缓冲区错误漏洞,攻击者可利用该漏洞执行恶意代码或通过欺骗用户在应用程序中上传格式不正确的.e70文件使应用程序崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
EatoneasySoft Software v7.xx prior to v7.22 -

II. Public POCs for CVE-2020-6655

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-6655

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2020-6655

No comments yet


Leave a comment