header-logo
Suggest Exploit
vendor:
RouteFinder 550 VPN
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: RouteFinder 550 VPN
Affected Version From: 4.63 and earlier
Affected Version To: 4.63 and earlier
Patch Exists: YES
Related CWE: CVE-2002-0674
CPE: h:multitech:routefinder_550_vpn
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

A vulnerability in Multitech RouteFinder 550 VPN firmware

A buffer overflow vulnerability exists in Multitech RouteFinder 550 VPN firmware release 4.63 and earlier. By passing excessive data to the device in an HTTP GET request, an attacker can corrupt memory and cause a denial of service. It is also possible for an attacker to execute arbitrary commands.

Mitigation:

Upgrade to the latest version of the firmware.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7067/info

A vulnerability has been discovered in Multitech RouteFinder 550 VPN firmware release 4.63 and earlier. The problem occurs due to insufficient bounds checking of data supplied in HTTP GET requests. By passing excessive data to the device it may be possible for a remote attacker to corrupt memory.

Successful exploitation of this bug may result in a denial of service, causing the device to crash. Although it has not been confirmed, it may also be possible for an attacker to exploit this issue to execute arbitrary commands.

GET /OPTIONS AAAAA..[Ax10001]..AAAAA.HTML
HTTP/1.1