The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability.
History

Wed, 18 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Zte
Zte zxhn E1600 Firmware
Zte zxhn E2603 Firmware
Zte zxhn E2615 Firmware
Zte zxhn E2618 Firmware
Zte zxhn E500 Firmware
Zte zxhn H108n Firmware
Zte zxhn H168a Firmware
Zte zxhn H168n Firmware
Zte zxhn H338a Firmware
Zte zxhn Z500 Firmware
Weaknesses CWE-121
CPEs cpe:2.3:o:zte:zxhn_e1600_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e2603_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e2615_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e2618_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h168a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h168n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h338a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_z500_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zte
Zte zxhn E1600 Firmware
Zte zxhn E2603 Firmware
Zte zxhn E2615 Firmware
Zte zxhn E2618 Firmware
Zte zxhn E500 Firmware
Zte zxhn H108n Firmware
Zte zxhn H168a Firmware
Zte zxhn H168n Firmware
Zte zxhn H338a Firmware
Zte zxhn Z500 Firmware
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Description The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-16T00:00:00

Updated: 2024-09-18T15:22:15.636Z

Reserved: 2024-08-28T00:00:00

Link: CVE-2024-45413

cve-icon Vulnrichment

Updated: 2024-09-18T15:20:03.644Z

cve-icon NVD

Status : Received

Published: 2024-09-16T21:15:45.833

Modified: 2024-09-18T16:35:11.470

Link: CVE-2024-45413

cve-icon Redhat

No data.