with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.
Metrics
Affected Vendors & Products
Solution
Make sure your devices are online so they can receive the automated update from Viasat. Make sure your device received the update by getting the running version using the administrative interface.
Workaround
No workaround given by the vendor.
Wed, 28 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Sat, 26 Apr 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 25 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem. | |
Title | SNORE Interface Unauthenticated Remote Code Execution | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: ONEKEY
Published:
Updated: 2025-05-08T03:56:03.465Z
Reserved: 2024-06-20T09:18:03.225Z
Link: CVE-2024-6198

Updated: 2025-04-25T14:25:36.736Z

Status : Awaiting Analysis
Published: 2025-04-25T13:15:42.370
Modified: 2025-04-29T13:52:28.490
Link: CVE-2024-6198


No data.