First published: Tue Mar 05 2019(Updated: )
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to a stack buffer overflow via crafted HTTP POST request sent by a remote, authenticated attacker to /GponForm/usb_Form?script/. An attacker can leverage this vulnerability to potentially execute arbitrary code.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nokia I-240w-q Gpon Ont Firmware | =3fe54567bozj19 | |
Nokia I-240w-q Gpon Ont | ||
All of | ||
Nokia I-240w-q Gpon Ont Firmware | =3fe54567bozj19 | |
Nokia I-240w-q Gpon Ont |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3921 has a critical severity rating due to the potential for arbitrary code execution.
To remediate CVE-2019-3921, update the Alcatel Lucent I-240W-Q GPON ONT firmware to a version that addresses the vulnerability.
CVE-2019-3921 affects devices running Alcatel Lucent I-240W-Q GPON ONT firmware version 3FE54567BOZJ19.
Yes, CVE-2019-3921 can be exploited remotely by an authenticated attacker through specific crafted HTTP POST requests.
CVE-2019-3921 is a stack buffer overflow vulnerability.