Impact
A stack-based buffer overflow occurs when the device processes redirect URLs, allowing an attacker to inject and execute arbitrary code with the device’s privileges. The flaw stems from improper bounds checking, and exploitation grants full control over the device, compromising confidentiality, integrity, and availability. Based on the description, any external source that can submit a crafted redirect URL may trigger the overflow.
Affected Systems
Silex Technology, Inc. products AMC Manager and SD-330AC are affected. No specific version information was provided, so all current releases of these products are considered vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. While EPSS data is not available, a stack-based buffer overflow enabling remote code execution suggests a realistic likelihood of exploitation if an attacker can contact the device. The vulnerability is not listed in CISA’s KEV catalog. The most probable attack path involves sending a malicious redirect URL from an external host to the device’s management interface, leading to arbitrary code execution.
OpenCVE Enrichment