This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the PBAP_DecodeVCARD function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
References
| Link | Resource |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-24-850/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-01-31 00:15
Updated : 2025-08-12 18:13
NVD link : CVE-2024-23963
Mitre link : CVE-2024-23963
CVE.ORG link : CVE-2024-23963
JSON object : View
Products Affected
alpsalpine
- ilx-f509
- ilx-f509_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
