secunia-readclient.txt...

- AV AC AU C I A
发布: 2008-06-24
修订: 2025-04-13

Secunia Research has discovered a vulnerability in Motion, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the "read_client()" function in webhttpd.c. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted request to the HTTP control interface. Successful exploitation allows execution of arbitrary code, but requires that the Motion HTTP control interface is enabled. Versions below 3.2.10.1 are affected.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息