CVE-2020-25858
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
El binario QCMAP_Web_CLIENT en la suite de software Qualcomm QCMAP anteriores a las versiones publicadas en octubre de 2020, no comprueba el valor de retorno de una llamada de strstr() o strchr() en la función Tokenizer(). Un atacante que invoca la interfaz web con una URL diseñada puede bloquear el proceso causando una denegación de servicio. Esta versión de QCMAP es usada en muchos tipos de dispositivos de red, principalmente puntos de acceso móviles y enrutadores LTE
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-23 CVE Reserved
- 2020-10-15 CVE Published
- 2023-07-01 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qualcomm Search vendor "Qualcomm" | Qualcomm Mobile Access Point Search vendor "Qualcomm" for product "Qualcomm Mobile Access Point" | - | - |
Affected
|