An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-19T10:48:28
Updated: 2024-08-03T22:55:53.172Z
Reserved: 2021-04-15T00:00:00
Link: CVE-2021-31226
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-08-19T11:15:07.563
Modified: 2024-11-21T06:05:20.260
Link: CVE-2021-31226
Redhat
No data.