The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities |
History
No history.
MITRE
Status: PUBLISHED
Assigner: VDOO
Published: 2020-10-15T15:11:50
Updated: 2024-08-04T15:49:06.010Z
Reserved: 2020-09-23T00:00:00
Link: CVE-2020-25858
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-10-15T16:15:12.087
Modified: 2020-10-26T21:25:13.363
Link: CVE-2020-25858
Redhat
No data.