Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-24640

Summary
Assigner-fortinet
Assigner Org ID-6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At-10 Mar, 2026 | 16:44
Updated At-11 Mar, 2026 | 03:56
Rejected At-
Credits

A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0.2 through 7.0.12 may allow a remote authenticated attacker who can bypass stack protection and ASLR to execute arbitrary code or commands via crafted HTTP requests.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:fortinet
Assigner Org ID:6abe59d8-c742-4dff-8ce8-9b0ca1073da8
Published At:10 Mar, 2026 | 16:44
Updated At:11 Mar, 2026 | 03:56
Rejected At:
▼CVE Numbering Authority (CNA)

A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0.2 through 7.0.12 may allow a remote authenticated attacker who can bypass stack protection and ASLR to execute arbitrary code or commands via crafted HTTP requests.

Affected Products
Vendor
Fortinet, Inc.Fortinet
Product
FortiWeb
CPEs
  • cpe:2.3:a:fortinet:fortiweb:8.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fortinet:fortiweb:7.0.2:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 8.0.0 through 8.0.2 (semver)
  • From 7.6.0 through 7.6.6 (semver)
  • From 7.4.0 through 7.4.12 (semver)
  • From 7.2.0 through 7.2.12 (semver)
  • From 7.0.2 through 7.0.12 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-121Execute unauthorized code or commands
Type: CWE
CWE ID: CWE-121
Description: Execute unauthorized code or commands
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Upgrade to FortiWeb version 8.0.3 or above Upgrade to FortiWeb version 7.6.7 or above

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://fortiguard.fortinet.com/psirt/FG-IR-26-087
N/A
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-26-087
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@fortinet.com
Published At:10 Mar, 2026 | 18:18
Updated At:12 Mar, 2026 | 20:12

A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0.2 through 7.0.12 may allow a remote authenticated attacker who can bypass stack protection and ASLR to execute arbitrary code or commands via crafted HTTP requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.6MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 7.0.2(inclusive) to 7.0.12(inclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 7.2.0(inclusive) to 7.6.7(exclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Fortinet, Inc.
fortinet
>>fortiweb>>Versions from 8.0.0(inclusive) to 8.0.3(exclusive)
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-121Primarypsirt@fortinet.com
CWE-787Primarynvd@nist.gov
CWE ID: CWE-121
Type: Primary
Source: psirt@fortinet.com
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://fortiguard.fortinet.com/psirt/FG-IR-26-087psirt@fortinet.com
Vendor Advisory
Hyperlink: https://fortiguard.fortinet.com/psirt/FG-IR-26-087
Source: psirt@fortinet.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

80Records found

CVE-2021-36173
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-8||HIGH
EPSS-0.67% / 71.48%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 18:42
Updated-25 Oct, 2024 | 13:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortigate-2600ffortigate-1100efortigate_60ffortigate-200ffortigate_2200efortigate_40ffortigate-600efortigate_1800ffortigate_7121ffortigate_3300efortigate-3500ffortigate_3600efortiosfortigate-400eFortinet FortiOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-22639
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 15.15%
||
7 Day CHG~0.00%
Published-13 Jun, 2023 | 08:41
Updated-23 Oct, 2024 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.12, FortiOS all versions 6.2, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.2, FortiProxy version 7.0.0 through 7.0.8, FortiProxy all versions 2.0, FortiProxy all versions 1.2, FortiProxy all versions 1.1, FortiProxy all versions 1.0 allows attacker to escalation of privilege via specifically crafted commands.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortiOSFortiProxy
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-17656
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-5.4||MEDIUM
EPSS-2.73% / 86.03%
||
7 Day CHG~0.00%
Published-12 Apr, 2021 | 14:14
Updated-25 Oct, 2024 | 13:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortinet FortiProxy, FortiOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-17652
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.55% / 68.08%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 15:23
Updated-25 Oct, 2024 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack buffer overflow vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to cause FortiClient processes running under root priviledge crashes via sending specially crafted "StartAvCustomScan" type IPC client requests to the fctsched process due the argv data not been well sanitized.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortinet FortiClientLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-42475
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-9.3||CRITICAL
EPSS-93.98% / 99.89%
||
7 Day CHG~0.00%
Published-02 Jan, 2023 | 08:18
Updated-24 Oct, 2025 | 12:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-01-03||Apply updates per vendor instructions.

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fpm-7620efortigate-6501f-dcfim-7904efim-7901efim-7910efortigate-7121ffim-7920efortiosfim-7921ffortigate-6500ffpm-7620ffpm-7630efortigate-7060efortiproxyfortigate-7030efortigate-6300ffortigate-6601f-dcfortigate-6601ffortigate-6300f-dcfortigate-7040efim-7941ffortigate-6500f-dcfortigate-6501fFortiOSFortiProxyFortiOS
CWE ID-CWE-197
Numeric Truncation Error
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-40688
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.18% / 38.70%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 22:35
Updated-20 Apr, 2026 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write vulnerability [CWE-787] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow a remote privileged attacker to execute arbitrary code or command via crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortiWeb
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-36179
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-8||HIGH
EPSS-0.58% / 69.12%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 10:15
Updated-25 Oct, 2024 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortinet FortiWeb
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-13383
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-4.3||MEDIUM
EPSS-1.76% / 82.73%
||
7 Day CHG+0.62%
Published-29 May, 2019 | 17:20
Updated-24 Oct, 2025 | 12:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-07-10||Apply updates per vendor instructions.

A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyfortiosFortinet FortiOS and FortiProxyFortiOS and FortiProxy
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-36186
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-8.8||HIGH
EPSS-0.53% / 67.54%
||
7 Day CHG~0.00%
Published-02 Nov, 2021 | 18:35
Updated-25 Oct, 2024 | 13:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortinet FortiWeb
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-32756
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-9.6||CRITICAL
EPSS-41.63% / 97.44%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 14:46
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-06-04||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticamera_firmwarefortivoiceforticamerafortimailfortindrfortirecorderFortiRecorderFortiVoiceFortiCameraFortiNDRFortiMailMultiple Products
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-32766
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.03% / 7.09%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 18:59
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or commands via crafted CLI commands

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortiWeb
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2021-26112
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-8.1||HIGH
EPSS-1.32% / 79.97%
||
7 Day CHG~0.00%
Published-06 Apr, 2022 | 09:15
Updated-25 Oct, 2024 | 13:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflow vulnerabilities [CWE-121] both in network daemons and in the command line interpreter of FortiWAN before 4.5.9 may allow an unauthenticated attacker to potentially corrupt control data in memory and execute arbitrary code via specifically crafted requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwanFortinet FortiWAN
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-25249
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-7.4||HIGH
EPSS-0.01% / 2.53%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 16:32
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows attacker to execute unauthorized code or commands via specially crafted packets

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiswitchmanagerfortisasefortiosFortiOSFortiSwitchManager
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-24018
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 30.46%
||
7 Day CHG~0.00%
Published-04 Aug, 2021 | 14:52
Updated-25 Oct, 2024 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortinet FortiOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-22130
Matching Score-6
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-6
Assigner-Fortinet, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.62% / 70.08%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 10:27
Updated-25 Oct, 2024 | 13:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability in FortiProxy physical appliance CLI 2.0.0 to 2.0.1, 1.2.0 to 1.2.9, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 may allow an authenticated, remote attacker to perform a Denial of Service attack by running the `diagnose sys cpuset` with a large cpuset mask value. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiproxyFortinet FortiProxy
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20042
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 13.03%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 02:34
Updated-23 Apr, 2025 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541780; Issue ID: ALPS08541780.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6763mt8678mt8765mt8788mt6873mt8796mt8167mt8385androidmt8195mt6779mt8766mt8395mt6877mt8786mt8798mt6833mt6768mt8673mt6785mt8365mt8173mt6893mt8362amt6761mt8321mt8791tmt8175mt8797mt6739mt8781mt6765mt6757mt6781mt8168mt8666mt8183mt6771mt8791mt8768mt8789mt6853mt6885MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8168, MT8173, MT8175, MT8183, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8673, MT8678, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798mt8175mt6873mt6893mt6771mt8385mt6833mt8395mt6885mt8673mt8666mt6877mt6781mt8365mt8167mt6765mt8183mt8195mt6853mt8168mt6739mt6757mt6761mt8321mt6768mt8362amt6779mt6785mt6763mt8173
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20006
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.05% / 15.40%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 05:59
Updated-16 Dec, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148.

Action-Not Available
Vendor-rdkcentralOpenWrtGoogle LLCMediaTek Inc.
Product-mt6890openwrtandroidmt6880mt8188tmt2713mt6781rdk-bMT2713, MT6781, MT6880, MT6890, MT8188Tmt6781mt2713mt6890mt8188tmt6880
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-2565
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.02%
||
7 Day CHG~0.00%
Published-16 Feb, 2026 | 16:32
Updated-23 Feb, 2026 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wavlink WL-NU516U1 adm.cgi sub_40785C stack-based overflow

A weakness has been identified in Wavlink WL-NU516U1 20251208. Affected by this issue is the function sub_40785C of the file /cgi-bin/adm.cgi. This manipulation of the argument time_zone causes stack-based buffer overflow. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-WAVLINK Technology Ltd.
Product-wl-nu516u1wl-nu516u1_firmwareWL-NU516U1
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2022-25785
Matching Score-4
Assigner-Secomea A/S
ShareView Details
Matching Score-4
Assigner-Secomea A/S
CVSS Score-6.6||MEDIUM
EPSS-1.13% / 78.41%
||
7 Day CHG~0.00%
Published-04 May, 2022 | 13:57
Updated-03 Aug, 2024 | 04:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overrun

Stack-based Buffer Overflow vulnerability in SiteManager allows logged-in or local user to cause arbitrary code execution. This issue affects: Secomea SiteManager all versions prior to 9.7.

Action-Not Available
Vendor-Secomea A/S
Product-sitemanager_1139_firmwaresitemanager_1129sitemanager_3539sitemanager_3339_firmwaresitemanager_1139sitemanager_3529sitemanager_1149sitemanager_3329sitemanager_3329_firmwaresitemanager_3549_firmwaresitemanager_3349sitemanager_3539_firmwaresitemanager_3349_firmwaresitemanager_1149_firmwaresitemanager_1129_firmwaresitemanager_3339sitemanager_3549sitemanager_3529_firmwareSiteManager
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11524
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.6||MEDIUM
EPSS-0.64% / 70.55%
||
7 Day CHG~0.00%
Published-15 May, 2020 | 16:14
Updated-04 Aug, 2024 | 11:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.

Action-Not Available
Vendor-n/aCanonical Ltd.openSUSEFreeRDP
Product-freerdpubuntu_linuxleapn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20073
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.22% / 44.53%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 02:04
Updated-25 Apr, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00367704; Issue ID: MSV-1411.

Action-Not Available
Vendor-MediaTek Inc.OpenWrt
Product-software_development_kitopenwrtmt6890mt7622MT6890, MT7622mt7622mt6890openwrt
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20054
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.07% / 20.99%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 02:35
Updated-23 Apr, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gnss, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08580200; Issue ID: ALPS08580200.

Action-Not Available
Vendor-rdkcentralMediaTek Inc.Google LLCOpenWrtThe Linux Foundation
Product-mt6895mt8678mt6890mt8765mt6835mt6855mt8788mt2735mt6875mt6873mt8792mt8796mt8385androidmt8195mt6762mt6985mt8766rdk-bmt6877mt8786mt6983mt6833mt8893mt6990mt6883mt8673mt8173mt6879mt2737mt6893mt6989openwrtmt8321mt8791tmt6889mt8755mt8775mt8676mt8781mt6765mt6769mt8168mt8666mt8667yoctomt8390mt8768mt6891mt6853mt6885MT2735, MT2737, MT6762, MT6765, MT6769, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT6985, MT6989, MT6990, MT8168, MT8173, MT8195, MT8321, MT8385, MT8390, MT8666, MT8667, MT8673, MT8676, MT8678, MT8755, MT8765, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8791T, MT8792, MT8796, MT8893mt6855mt8765mt8786mt8188mt6833mt8788mt8791tmt8167mt6765mt6895mt8168mt6789mt8798mt8768mt8789mt6761mt8797mt8321mt6768mt8781mt8766
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20072
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.22% / 44.53%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 02:04
Updated-25 Apr, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00364732; Issue ID: MSV-1332.

Action-Not Available
Vendor-MediaTek Inc.OpenWrt
Product-mt7622mt6890mt6990software_development_kitopenwrtMT6890, MT6990, MT7622mt7622mt6990mt6890openwrt
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20074
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.13% / 31.55%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 02:04
Updated-25 Apr, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08668110; Issue ID: MSV-1333.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6886mt8673mt6785mt8667mt6989mt6779mt6768mt6739mt6983mt6895mt6781mt6835mt6873mt6789mt6885mt6897androidmt6883mt6765mt6985mt6761mt6853mt6889mt6877mt6879mt8666mt6580mt6893mt6833mt8676mt6855MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8666, MT8667, MT8673, MT8676mt6855mt6985mt6873mt6893mt6833mt6580mt6886mt6885mt8673mt6983mt6989mt8666mt6877mt6781mt6765mt6853mt6883mt8667mt8676mt6895mt6789mt6835mt6739mt6761mt6889mt6768mt6779mt6897mt6785mt6879
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4544
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.5||HIGH
EPSS-1.27% / 79.62%
||
7 Day CHG~0.00%
Published-11 May, 2025 | 18:31
Updated-22 May, 2025 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DI-8100 jhttpd ddos.asp stack-based overflow

A vulnerability was found in D-Link DI-8100 up to 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /ddos.asp of the component jhttpd. The manipulation of the argument def_max/def_time/def_tcp_max/def_tcp_time/def_udp_max/def_udp_time/def_icmp_max leads to stack-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult.

Action-Not Available
Vendor-D-Link Corporation
Product-di-8100di-8100_firmwareDI-8100
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28572
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.10% / 27.59%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN HOST

Memory corruption in WLAN HOST while processing the WLAN scan descriptor list.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaresa8145p_firmwaresw5100pmsm8996au_firmwareqca6554afastconnect_6800qca6595qca6431_firmwareqca6564aucsrb31024mdm9628_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_865_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwarewsa8835qca6574msm8996ausnapdragon_auto_5g_modem-rfwcd9380sa8150p_firmwareqca6595au_firmwaresnapdragon_auto_4g_modem_firmwareqca6574aqca9379_firmwareqca6174aqca6426qca6584au_firmwareqca6564awcn3980qca9377qcc2076_firmwareqca6554a_firmwarewcd9385_firmwareqam8295pqcc2073_firmwaremdm9628qca6574_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqam8295p_firmwareqca6175aqca6426_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574a_firmwareqca6574au_firmwareqca6595auwcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6391qca6436_firmwaresnapdragon_820_automotive_platformsa8295pqca6421_firmwarefastconnect_7800qca6564au_firmwareqca6584ausa6155p_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformqca6678aq_firmwaresnapdragon_auto_4g_modemqca6678aqcsrb31024_firmwareqca6698aqfastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwareqca6421qca6564a_firmwaresa8195pwsa8810_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436sa6155psw5100p_firmwareqca6698aq_firmwaresa6145pqca6174a_firmwarewcd9385qca6431qca6696_firmwareqca6595_firmwaresa8145pqca6696qca6391_firmwaresa8150psa6150psa8155pwsa8830_firmwareqcc2076wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwaresa8295p_firmwareqca9379qcc2073qca6175a_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20109
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.63% / 70.43%
||
7 Day CHG~0.00%
Published-27 Sep, 2023 | 17:23
Updated-28 Oct, 2025 | 13:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-10-31||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosios_xeCisco IOS XE SoftwareIOSIOS and IOS XE
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20043
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 13.03%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 02:35
Updated-23 Apr, 2025 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541781; Issue ID: ALPS08541781.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6763mt8678mt8765mt8788mt6873mt8796mt8167mt8385androidmt8195mt6779mt8766mt8395mt6877mt8786mt8798mt6833mt6768mt8185mt8673mt6785mt8365mt8173mt6893mt8362amt6761mt8321mt8791tmt8175mt8797mt6739mt8781mt6765mt6757mt6781mt8168mt8666mt6771mt8791mt8768mt8789mt6853mt6885MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8673, MT8678, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798mt8175mt6873mt6893mt6771mt8385mt6833mt8395mt6885mt8673mt8666mt6877mt6781mt8365mt8167mt6765mt8195mt6853mt8168mt6739mt6757mt6761mt8185mt8321mt6768mt8362amt6779mt6785mt6763mt8173
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20028
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.06% / 18.14%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 02:43
Updated-22 Apr, 2025 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541687.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6763mt8167mt6885mt6768mt8168mt6785mt6877mt6771mt6873mt8163mt6779mt6833mt6893mt6765mt6739mt6761mt6853androidmt6757mt8512MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8163, MT8167, MT8168, MT8512mt6873mt6893mt6771mt6833mt6885mt6877mt8167mt6765mt6853mt8168mt6739mt6757mt6761mt6768mt6779mt8163mt6785mt6763
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-20044
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 13.03%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 02:35
Updated-23 Apr, 2025 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541784; Issue ID: ALPS08541784.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6763mt8678mt8765mt8788mt6873mt8796mt8167mt8385androidmt8195mt6779mt8766mt8395mt6877mt8786mt8798mt6833mt6768mt8185mt8673mt6785mt8365mt8173mt6893mt8362amt6761mt8321mt8791tmt8175mt8797mt6739mt8781mt6765mt6757mt6781mt8168mt8666mt6771mt8791mt8768mt8789mt6853mt6885MT6739, MT6757, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8168, MT8173, MT8175, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8673, MT8678, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798mt8175mt6873mt6893mt6771mt8385mt6833mt8395mt6885mt8673mt8666mt6877mt6781mt8365mt8167mt6765mt8195mt6853mt8168mt6739mt6757mt6761mt8185mt8321mt6768mt8362amt6779mt6785mt6763mt8173
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • Next
Details not found