CVE-2018-3864Classic Buffer Overflow in Samsung Smartthings HUB Sth-eth-250

Severity
8.8HIGHNVD
EPSS
0.4%
top 41.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 20
Latest updateMay 13

Description

An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long "password" value in order to exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5samsung/smartthings_hub_sth-eth-250Firmware version 0.20.17

🔴Vulnerability Details

2
GHSA
GHSA-w75f-gw3f-7vf9: An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-2502022-05-13
CVEList
CVE-2018-3864: An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-2502018-09-20
CVE-2018-3864 — Classic Buffer Overflow in Samsung | cvebase