An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem. Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
History

Fri, 25 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 25 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
Description An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem. Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
Title Unauthenticated Remote Code Execution
Weaknesses CWE-120
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ONEKEY

Published: 2025-04-25T13:02:50.214Z

Updated: 2025-04-25T14:25:11.847Z

Reserved: 2024-06-20T09:18:04.777Z

Link: CVE-2024-6199

cve-icon Vulnrichment

Updated: 2025-04-25T14:25:08.425Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-25T13:15:43.510

Modified: 2025-04-29T13:52:28.490

Link: CVE-2024-6199

cve-icon Redhat

No data.