|Category:||Web application abuses|
|Title:||NUUO NVRmini2 < 3.10.0 Remote Stack Overflow Vulnerability|
|Summary:||NUUO NVRmini2 is prone to a unauthenticated remote stack overflow;vulnerability.|
NUUO NVRmini2 is prone to a unauthenticated remote stack overflow
Sending a crafted GET request to the affected service with a URI length of 351
or greater will trigger the stack overflow. Overflowing of the stack variable, which is intended to hold the
request data, results in the overwriting of stored return addresses, and with a properly crafted payload, can be
leveraged to achieve arbitrary code execution.
Remote, unauthenticated users can execute arbitrary code on the affected system
with root privileges.
Update to version 3.10.0 or later.
Common Vulnerability Exposure (CVE) ID: CVE-2018-19864|
|Copyright||This script is Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.