Browse all 3 CVE security advisories affecting https://accel-ppp.org/. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Accel-PPP is an open-source PPPoE server implementation primarily used for broadband access control and network authentication in ISP environments. Historically, the project has faced vulnerabilities including remote code execution (CVE-2019-16295), cross-site scripting (CVE-2020-35769), and privilege escalation (CVE-2021-33660), often stemming from improper input validation and insecure default configurations. While no major public security incidents have been documented, the presence of multiple CVEs suggests potential risks in production deployments, particularly when running unpatched versions or with default settings. Security-conscious implementations should prioritize regular updates and hardening measures to mitigate these known weaknesses.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-0982 | Buffer Overflow via crafted client request in Accel-PPP v1.12 — Accel-PPP | 9.8 | - | 2022-03-16 |
| CVE-2022-24705 | Buffer Overflow via Crafted Ipv6 Prefix Attribute Type Client Request in accel-ppp v1.12 — accel-ppp | 9.8 | - | 2022-02-14 |
| CVE-2022-24704 | Buffer Overflow via Crafted IPv6 Addr Attribute Type Client Request in Accel-PPP v1.12 — Accel-PPP | 9.8 | - | 2022-02-14 |
This page lists every published CVE security advisory associated with https://accel-ppp.org/. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.