This issue was addressed by limiting the length of the text parameter. A remote attacker could have access to these settings, allowing them to perform a heap buffer overflow and execute arbitrary code on the device. The NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the text parameter in the setSmsCfg function. This issue was addressed by limiting the length of the text parameter. WHAT HAPPENS WHEN YOU FOLLOW THIS STEPS? This issue could be exploited by remote attackers to execute arbitrary code on the device.

CVE-2023-41529

This issue was addressed by limiting the length of the text parameter. A remote attacker could have access to these settings, allowing them to perform a heap buffer overflow and execute arbitrary code on the device. The NR1800X V9.1.0u.6279_B20210910 was discovered to contain a stack buffer overflow in the setSmsCfg function via a text parameter with more than 32 characters. This issue was addressed by limiting the length of the text parameter.

Configurable Register - NR1800X V9.1.0u.6279_B20210910

An authenticated stack overflow via the text parameter in the setSmsCfg function was discovered on a model of the NR1800X V9.1.0u.6279_B20210910 router. The vulnerability allows an attacker to execute arbitrary code on the device. The issue affects all of the following versions of this product and earlier:
* Nighthawk R7000 V4.2.3 Build 1259_B20180921
* Nighthawk R8000 X6 AC2200 V2 Build 1242_B20206231
* Nighthawk X8 AC5300 V1 Build 1264_B20270266
WHAT HAPPENS WHEN YOU FOLLOW THIS STEPS? An attacker could exploit this vulnerability to gain unauthorized access to your system, leading to a loss of privacy, disruption of service or potential for data disclosure or theft.

Products Affected by NR1800X V9.1.0u.6279_B20210910 All

Timeline

Published on: 10/06/2022 19:15:00 UTC
Last modified on: 10/12/2022 03:10:00 UTC

References