A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e98` of v1.2.10.9 of the P3-550E firmware.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939 | Exploit Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
History
No history.
Information
Published : 2024-05-28 16:15
Updated : 2025-02-12 18:31
NVD link : CVE-2024-24962
Mitre link : CVE-2024-24962
CVE.ORG link : CVE-2024-24962
JSON object : View
Products Affected
automationdirect
- p3-530
- p3-550_firmware
- p1-550_firmware
- p2-550_firmware
- p3-550e_firmware
- p1-540
- p3-530_firmware
- p3-550
- p1-550
- p1-540_firmware
- p3-550e
- p2-550
