Page 2 of 86 results (0.045 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Router Advertisement Daemon. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-23-710 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

An issue in the bridge2 component of MikroTik RouterOS v6.40.5 allows attackers to cause a Denial of Service (DoS) via crafted packets. • http://mikrotik.com http://routeros.com https://github.com/ZYen12138/RouterOS/blob/main/CVE-2023-24094.md • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Mikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot process. This vulnerability allows attackers to execute arbitrary code via a crafted nova message. Se descubrió que Mikrotik RouterOs anteriores a la versión estable 7.5 contenía una lectura fuera de los límites en el proceso del punto de acceso. Esta vulnerabilidad permite a los atacantes ejecutar código arbitrario a través de un mensaje nova manipulado. • https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet. Se descubrió que Mikrotik RouterOs anteriores a la versión estable 7.6 contenía una lectura fuera de los límites en el proceso snmp. Esta vulnerabilidad permite a los atacantes ejecutar código arbitrario a través de un paquete manipulado. • https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 2

The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later. El servidor web Mikrotik RouterOS permite una corrupción de memoria en versiones anteriores a Stable 6.38.5 y Long-term 6.37.5, también se conoce como Chimay-Red. Un usuario remoto y no autenticado puede desencadenar la vulnerabilidad mediante el envío de una petición HTTP diseñada. • https://github.com/BigNerd95/Chimay-Red https://www.bleepingcomputer.com/news/security/hajime-botnet-makes-a-comeback-with-massive-scan-for-mikrotik-routers • CWE-787: Out-of-bounds Write •