First published: Fri May 29 2020(Updated: )
E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution.
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
Huawei E6878-370 Firmware | =10.0.3.1\(h557sp27c233\) | |
Huawei E6878-370 Firmware | =10.0.3.1\(h563sp1c233\) | |
Huawei E6878-370 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1832 is a vulnerability found in Huawei E6878-370 products with versions 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00).
CVE-2020-1832 has a severity value of 8.8, which is considered high.
CVE-2020-1832 is a stack buffer overflow vulnerability in Huawei E6878-370 products. An attacker in the adjacent network could exploit this vulnerability by sending a crafted message.
CVE-2020-1832 affects Huawei E6878-370 products with versions 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00).
You can find more information about CVE-2020-1832 in the security advisory published by Huawei at https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-stack-en.