CVE-2022-39067

There is a buffer overflow vulnerability in ZTE MF286R. Due to lack of input validation on parameters of the wifi interface, an authenticated attacker could use the vulnerability to perform a denial of service attack.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zte:mf286r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zte:mf286r:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784 - Vendor Advisory () https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027784 - Vendor Advisory

Information

Published : 2022-11-22 17:15

Updated : 2025-04-29 05:15


NVD link : CVE-2022-39067

Mitre link : CVE-2022-39067

CVE.ORG link : CVE-2022-39067


JSON object : View

Products Affected

zte

  • mf286r
  • mf286r_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')