7 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected. • https://vulncheck.com/advisories/mikrotik-jsproxy-dos • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Router Advertisement Daemon. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-23-710 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Mikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot process. This vulnerability allows attackers to execute arbitrary code via a crafted nova message. Se descubrió que Mikrotik RouterOs anteriores a la versión estable 7.5 contenía una lectura fuera de los límites en el proceso del punto de acceso. Esta vulnerabilidad permite a los atacantes ejecutar código arbitrario a través de un mensaje nova manipulado. • https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet. Se descubrió que Mikrotik RouterOs anteriores a la versión estable 7.6 contenía una lectura fuera de los límites en el proceso snmp. Esta vulnerabilidad permite a los atacantes ejecutar código arbitrario a través de un paquete manipulado. • https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter. En MikroTik RouterOS hasta el 01-04-2021, la página de inicio de sesión del hotspot es vulnerable a un ataque de tipo XSS reflejado por medio del parámetro objetivo. • https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md https://m4dm0e.github.io/2021/01/04/mikrotik-xss-reflected.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •