DrayTek Vigor310 devices through 4.3.2.6 allow a remote...
Critical severity
Unreviewed
Published
Oct 3, 2024
to the GitHub Advisory Database
•
Updated Oct 8, 2024
Description
Published by the National Vulnerability Database
Oct 3, 2024
Published to the GitHub Advisory Database
Oct 3, 2024
Last updated
Oct 8, 2024
DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
References