A vulnerability was detected in code-projects for Plugin 4.1.2cu.5137. The impacted element is the function setWiFiMultipleConfig in the library /lib/cste_modules/wireless.so of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument wepkey2 results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects for Plugin |
|
| Vendors & Products |
Code-projects
Code-projects for Plugin |
Thu, 30 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in code-projects for Plugin 4.1.2cu.5137. The impacted element is the function setWiFiMultipleConfig in the library /lib/cste_modules/wireless.so of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument wepkey2 results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. | |
| Title | code-projects for Plugin cstecgi.cgi setWiFiMultipleConfig buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-04-30T21:45:11.565Z
Updated: 2026-04-30T21:45:11.565Z
Reserved: 2026-04-30T14:45:25.250Z
Link: CVE-2026-7503
No data.
Status : Received
Published: 2026-04-30T22:16:26.920
Modified: 2026-04-30T22:16:26.920
Link: CVE-2026-7503
No data.