First published: Mon Aug 26 2024(Updated: )
A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Fastcom Fw300r | =1.3.13_build_141023_rel.61347n | |
Fastcom Fw300r Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41285 is classified as a critical vulnerability due to its potential to allow attackers to execute arbitrary code or cause denial of service.
To mitigate CVE-2024-41285, upgrade to the latest version of FAST FW300R firmware that addresses this vulnerability.
CVE-2024-41285 can be exploited to execute arbitrary code or trigger a denial of service condition.
CVE-2024-41285 affects FAST FW300R firmware version 1.3.13 Build 141023 Rel.61347n.
Any user of the FAST FW300R router running the vulnerable firmware version is at risk from CVE-2024-41285.