// For flags

CVE-2022-24910

 

Severity Score

6.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A buffer overflow vulnerability exists in the httpd parse_ping_result API functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.

Se presenta una vulnerabilidad de desbordamiento de búfer en la funcionalidad de la API httpd parse_ping_result de InHand Networks InRouter302 versión V3.5.4. Un archivo especialmente diseñado puede conllevar a una ejecución de código remota. Un atacante puede enviar una secuencia de peticiones para desencadenar esta vulnerabilidad

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-22 CVE Reserved
  • 2022-05-12 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-16 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Inhandnetworks
Search vendor "Inhandnetworks"
Ir302 Firmware
Search vendor "Inhandnetworks" for product "Ir302 Firmware"
<= 3.5.37
Search vendor "Inhandnetworks" for product "Ir302 Firmware" and version " <= 3.5.37"
-
Affected
in Inhandnetworks
Search vendor "Inhandnetworks"
Ir302
Search vendor "Inhandnetworks" for product "Ir302"
--
Safe