Description
A CWE-122 “Heap-based Buffer Overflow” vulnerability in the “logger_generic” function of the “Ax_rtu” binary allows a remote authenticated attacker to trigger a memory corruption in the context of the binary. This may result in a Denial-of-Service (DoS) condition, possibly in the execution of arbitrary code with the same privileges of the process (root), or have other unspecified impacts on the device. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.
Published: 2024-03-05
Score: 7.5 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-49883 A CWE-122 “Heap-based Buffer Overflow” vulnerability in the “logger_generic” function of the “Ax_rtu” binary allows a remote authenticated attacker to trigger a memory corruption in the context of the binary. This may result in a Denial-of-Service (DoS) condition, possibly in the execution of arbitrary code with the same privileges of the process (root), or have other unspecified impacts on the device. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.
History

Thu, 10 Apr 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Ailux
Ailux imx6
Weaknesses CWE-787
CPEs cpe:2.3:a:ailux:imx6:*:*:*:*:*:*:*:*
Vendors & Products Ailux
Ailux imx6

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2024-08-23T20:21:11.411Z

Reserved: 2023-10-09T08:26:54.316Z

Link: CVE-2023-45591

cve-icon Vulnrichment

Updated: 2024-08-02T20:21:16.748Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-05T12:15:45.833

Modified: 2025-04-10T20:35:32.530

Link: CVE-2023-45591

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses