An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.
Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem. Customers that have not enabled Dynamic DNS on their modem are not vulnerable. | |
Title | Unauthenticated Remote Code Execution | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: ONEKEY
Published: 2025-04-25T13:02:50.214Z
Updated: 2025-04-25T14:25:11.847Z
Reserved: 2024-06-20T09:18:04.777Z
Link: CVE-2024-6199

Updated: 2025-04-25T14:25:08.425Z

Status : Awaiting Analysis
Published: 2025-04-25T13:15:43.510
Modified: 2025-04-29T13:52:28.490
Link: CVE-2024-6199

No data.