The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: VDOO
Published: 2020-10-15T15:11:50
Updated: 2024-08-04T15:49:06.010Z
Reserved: 2020-09-23T00:00:00
Link: CVE-2020-25858

No data.

Status : Modified
Published: 2020-10-15T16:15:12.087
Modified: 2024-11-21T05:18:55.137
Link: CVE-2020-25858

No data.