An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header
References
Link | Resource |
---|---|
https://github.com/4thline/cling/issues/253 | Exploit Issue Tracking Patch Third Party Advisory |
https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of?tns_redirect=true | Not Applicable |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-08-15T19:10:38
Updated: 2022-08-15T19:10:38
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-23622
JSON object: View
NVD Information
Status : Modified
Published: 2022-08-15T20:15:09.040
Modified: 2024-05-17T01:45:35.480
Link: CVE-2020-23622
JSON object: View
Redhat Information
No data.
CWE