First published: Fri Jan 24 2025(Updated: )
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SunGrow WiNet-SV200 | <=200.001.00.P027 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50694 is classified as a high severity vulnerability due to the risk of stack-based buffer overflow.
To fix CVE-2024-50694, upgrade to the latest version of SunGrow WiNet-SV200 that addresses the buffer overflow issue.
CVE-2024-50694 affects SunGrow WiNet-SV200 versions up to and including 200.001.00.P027.
CVE-2024-50694 is a stack-based buffer overflow vulnerability related to the handling of MQTT message timestamps.
Yes, CVE-2024-50694 can potentially be exploited remotely through malicious MQTT messages, leading to severe consequences.