Actiontec WCB6200Q Cookie Format String Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Actiontec WCB6200Q routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the HTTP server. A crafted Cookie header in an HTTP request can trigger the use of a format specifier from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the HTTP server. Was ZDI-CAN-21417.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-808/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: zdi
Published: 2024-06-18T23:39:02.468Z
Updated: 2024-06-20T14:21:43.658Z
Reserved: 2024-06-18T21:08:52.383Z
Link: CVE-2024-6145
JSON object: View
NVD Information
Status : Awaiting Analysis
Published: 2024-06-19T00:15:50.413
Modified: 2024-06-20T12:44:01.637
Link: CVE-2024-6145
JSON object: View
Redhat Information
No data.
CWE