Unchecked length coming from user input in settings shell
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw | Exploit Patch Vendor Advisory | 
| https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw | Exploit Patch Vendor Advisory | 
Configurations
                    History
                    22 Jan 2025, 17:12
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw - Exploit, Patch, Vendor Advisory | |
| CPE | cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | |
| CWE | CWE-787 | |
| First Time | Zephyrproject zephyr Zephyrproject | 
21 Nov 2024, 08:44
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw - | 
18 Feb 2024, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-18 07:15
Updated : 2025-01-22 17:12
NVD link : CVE-2023-6749
Mitre link : CVE-2023-6749
CVE.ORG link : CVE-2023-6749
JSON object : View
Products Affected
                zephyrproject
- zephyr
