Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 27 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastcom fw300r Firmware
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:fastcom:fw300r:-:*:*:*:*:*:*:* cpe:2.3:o:fastcom:fw300r_firmware:1.3.13_build_141023_rel.61347n:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fastcom fw300r Firmware
|
Mon, 26 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastcom
Fastcom fw300r |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:fastcom:fw300r:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fastcom
Fastcom fw300r |
|
| Metrics |
cvssV3_1
|
Mon, 26 Aug 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-26T17:28:24.148Z
Reserved: 2024-07-18T00:00:00.000Z
Link: CVE-2024-41285
Updated: 2024-08-26T17:27:12.347Z
Status : Analyzed
Published: 2024-08-26T16:15:08.990
Modified: 2024-08-27T16:03:16.043
Link: CVE-2024-41285
No data.
OpenCVE Enrichment
No data.