Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 21 Nov 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fiberhome an5506-04-fa Firmware
Fiberhome hg6245d Firmware |
|
| CPEs | cpe:2.3:o:fiberhome:an5506-04-fa_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fiberhome an5506-04-fa Firmware
Fiberhome hg6245d Firmware |
Thu, 13 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fiberhome
Fiberhome an5506-04-fa Fiberhome hg6245d |
|
| Vendors & Products |
Fiberhome
Fiberhome an5506-04-fa Fiberhome hg6245d |
Wed, 12 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FiberHome AN5506-04-FA firmware versions up to and including RP2631 and HG6245D prior to RP2602 contain a stack-based buffer overflow, as the HTTP service ('webs') fails to enforce maximum lengths for Cookie header values. When a cookie longer than 511 bytes is processed, a stack buffer is overrun, leading to a crash or potential control of execution flow. | |
| Title | FIberHome AN5506-04-FA / HG6245D Routers Remote Stack Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-21T15:36:02.534Z
Reserved: 2025-11-12T21:24:45.845Z
Link: CVE-2021-4464
Updated: 2025-11-13T14:30:34.032Z
Status : Awaiting Analysis
Published: 2025-11-12T22:15:42.027
Modified: 2025-11-14T16:42:30.503
Link: CVE-2021-4464
No data.
OpenCVE Enrichment
Updated: 2025-11-13T09:52:14Z