Samsung Smartthings Hub Sth-Eth-250 vulnerabilities
23 known vulnerabilities affecting samsung/smartthings_hub_sth-eth-250.
Total CVEs
23
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL12HIGH11
Vulnerabilities
Page 2 of 2
CVE-2018-3902CRITICALCVSS 9.9vFirmware version 0.20.172018-08-23
CVE-2018-3902 [CRITICAL] CWE-787 CVE-2018-3902: An exploitable buffer overflow vulnerability exists in the camera "replace" feature of video-core's
An exploitable buffer overflow vulnerability exists in the camera "replace" feature of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly extracts the URL field from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an
cvelistv5nvd
CVE-2018-3879HIGHCVSS 8.8vFirmware version 0.20.172018-08-23
CVE-2018-3879 [HIGH] CWE-89 CVE-2018-3879: An exploitable JSON injection vulnerability exists in the credentials handler of video-core's HTTP s
An exploitable JSON injection vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly parses the user-controlled JSON payload, leading to a JSON injection which in turn leads to a SQL injection in the video-core database. A
cvelistv5nvd
CVE-2018-3912HIGHCVSS 7.8vFirmware version 0.20.172018-08-23
CVE-2018-3912 [HIGH] CWE-787 CVE-2018-3912: On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process
On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process insecurely extracts the fields from the "shard" table of its SQLite database, leading to a buffer overflow on the stack. The strcpy call overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey"
cvelistv5nvd
← Previous2 / 2