A buffer overflow vulnerability exists in the FileX Internal RAM interface functionality of STMicroelectronics X-CUBE-AZRTOS-WL 2.0.0. A specially crafted set of network packets can lead to code execution. An attacker can send a sequence of requests to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-2096 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2096 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-04-02 14:15
Updated : 2025-09-05 17:11
NVD link : CVE-2024-45064
Mitre link : CVE-2024-45064
CVE.ORG link : CVE-2024-45064
JSON object : View
Products Affected
st
- x-cube-azrtos-wb
- x-cube-azrtos-wl
- x-cube-azrtos-f4
- x-cube-azrtos-g4
- x-cube-azrt-h7rs
- x-cube-azrtos-g0
- x-cube-azrtos-l4
- x-cube-azrtos-f7
- x-cube-azrtos-h7
- x-cube-azrtos-l5
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
