First published: Tue Mar 05 2019(Updated: )
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to a stack buffer overflow via crafted HTTP POST request sent by a remote, unauthenticated attacker to /GponForm/fsetup_Form. An attacker can leverage this vulnerability to potentially execute arbitrary code.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Nokia I-240w-q Gpon Ont | =3fe54567bozj19 | |
Nokia I-240w-q Gpon Ont Firmware | ||
Nokia I-240w-q Gpon Ont | =3fe54567bozj19 | |
Nokia I-240w-q Gpon Ont Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3922 is considered a high severity vulnerability due to the potential for remote code execution.
To remediate CVE-2019-3922, upgrade the affected Alcatel Lucent I-240W-Q GPON ONT firmware to a version that is not vulnerable.
CVE-2019-3922 affects devices specifically running the firmware version 3FE54567BOZJ19 of the Nokia I-240W-Q GPON ONT.
CVE-2019-3922 is a stack buffer overflow vulnerability that can be exploited through crafted HTTP POST requests.
Yes, CVE-2019-3922 can be exploited remotely by unauthenticated attackers.