- Description
- an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.
- Source
- cve-coordination@incibe.es
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:grandstream:gds3710_firmware:1.0.11.13:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB284370-1D95-46FE-B745-E8277B04C08D"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:grandstream:gds3710:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "222663C8-CD2A-41DC-BD34-4EDBDE59A932"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]