with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-12537 | The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem. |
Solution
Make sure your devices are online so they can receive the automated update from Viasat. Make sure your device received the update by getting the running version using the administrative interface.
Workaround
No workaround given by the vendor.
Wed, 28 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Sat, 26 Apr 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 25 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 25 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem. | |
| Title | SNORE Interface Unauthenticated Remote Code Execution | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ONEKEY
Published:
Updated: 2025-05-08T03:56:03.465Z
Reserved: 2024-06-20T09:18:03.225Z
Link: CVE-2024-6198
Updated: 2025-04-25T14:25:36.736Z
Status : Awaiting Analysis
Published: 2025-04-25T13:15:42.370
Modified: 2025-04-29T13:52:28.490
Link: CVE-2024-6198
OpenCVE Enrichment
No data.
EUVD