vendor:
MQX RTCS
by:
Anonymous
9.8
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: MQX RTCS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Private Network
2020
MQX RTCS Code Execution via DHCP Options Overflow
This exploit is a proof-of-concept for a buffer overflow vulnerability in the MQX RTCS code. It uses a default valid DHCP packet to overwrite an event function pointer, allowing for code execution.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all software is up-to-date and patched.