This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Metrics
Affected Vendors & Products
References
History
Fri, 31 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 | |
Metrics |
cvssV3_1
|
Thu, 30 Jan 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. | |
Title | Silicon Labs Gecko OS HTTP GET Request Handling Stack-based Buffer Overflow | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-01-30T23:28:55.542Z
Updated: 2025-06-30T17:53:31.238Z
Reserved: 2024-01-25T00:14:42.600Z
Link: CVE-2024-23973

Updated: 2025-01-31T18:59:04.152Z

Status : Undergoing Analysis
Published: 2025-01-31T00:15:10.027
Modified: 2025-06-30T18:15:25.103
Link: CVE-2024-23973

No data.