Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'firmwall domain WORD description (WORD|null)' command template.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-44237 Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'firmwall domain WORD description (WORD|null)' command template.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Nov 2025 05:30:00 +0900


Wed, 02 Apr 2025 00:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-11-04T19:13:17.991Z

Reserved: 2022-09-19T18:30:35.087Z

Link: CVE-2022-40991

cve-icon Vulnrichment

Updated: 2025-11-04T19:13:17.991Z

cve-icon NVD

Status : Modified

Published: 2023-01-26T22:15:16.953

Modified: 2025-11-04T20:16:05.847

Link: CVE-2022-40991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses