Description
The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
Published: 2020-10-15
Score: 7.5 High
EPSS: 2.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-18491 The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
History

No history.

Subscriptions

Qualcomm Qualcomm Mobile Access Point
cve-icon MITRE

Status: PUBLISHED

Assigner: VDOO

Published:

Updated: 2024-08-04T15:49:06.010Z

Reserved: 2020-09-23T00:00:00.000Z

Link: CVE-2020-25858

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-15T16:15:12.087

Modified: 2024-11-21T05:18:55.137

Link: CVE-2020-25858

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses