A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24955 A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a potential attacker could submit any "Address" value and it would be copied to a second variable with a "strcpy" vulnerable function without checking its length. Because of this, it is possible to send a long address value to overflow the process stack, controlling the function return address.
Fixes

Solution

No solution given by the vendor.


Workaround

Circutor has not responded to requests to work with CISA to mitigate this vulnerability. Users of these affected products are invited to contact Circutor customer support for additional information.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:18:54.034Z

Reserved: 2022-05-10T00:00:00.000Z

Link: CVE-2022-1669

cve-icon Vulnrichment

Updated: 2024-08-03T00:10:03.719Z

cve-icon NVD

Status : Modified

Published: 2022-05-24T18:15:08.353

Modified: 2024-11-21T06:41:13.163

Link: CVE-2022-1669

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.