An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c368 the value for the s_mac key is copied using strcpy to the buffer at 0xa000170c. This buffer is 25 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3".
Advisories
Source ID Title
EUVD EUVD EUVD-2017-7541 An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c368 the value for the s_mac key is copied using strcpy to the buffer at 0xa000170c. This buffer is 25 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3".
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-05T20:20:05.614Z

Reserved: 2017-10-31T00:00:00

Link: CVE-2017-16346

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-02T19:29:00.700

Modified: 2024-11-21T03:16:18.280

Link: CVE-2017-16346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses