Severity
9.9CRITICAL
EPSS
0.4%
top 41.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23
Latest updateMay 13

Description

On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. The memcpy call overflows the destination buffer, which has a size of 512 bytes. An attacker can send an arbitrarily long "url" value in order to overwrite the saved-PC with 0x42424242.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages2 packages

CVEListV5talos/samsungSamsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17

🔴Vulnerability Details

3
GHSA
GHSA-rfq8-x5m9-6822: On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 02022-05-13
OSV
linux-hwe, linux-azure vulnerabilities2019-03-06
CVEList
CVE-2018-3903: On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 02018-08-23
CVE-2018-3903 (CRITICAL CVSS 9.9) | On Samsung SmartThings Hub STH-ETH- | cvebase.io