First published: Fri Oct 13 2023(Updated: )
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the hostName parameter in the FUN_0040dabc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netis-systems N3m Firmware | =1.0.1.865 | |
Netis-systems N3m | =v2 | |
All of | ||
Netis-systems N3m Firmware | =1.0.1.865 | |
Netis-systems N3m | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45463 is a vulnerability discovered in Netis N3Mv2-V1.0.1.865 that allows attackers to cause a Denial of Service (DoS) via a crafted input.
The severity of CVE-2023-45463 is high (7.5).
CVE-2023-45463 allows attackers to cause a Denial of Service (DoS) by exploiting a buffer overflow via the hostName parameter in the FUN_0040dabc function.
The CWE for CVE-2023-45463 are CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).
You can find more information about CVE-2023-45463 at the following reference: [link](https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md).