### [CVE-2021-30288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30288) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=APQ8009%2C%20APQ8053%2C%20APQ8096AU%2C%20AQT1000%2C%20AR8031%2C%20AR8035%2C%20CSR8811%2C%20CSRA6620%2C%20CSRA6640%2C%20CSRB31024%2C%20IPQ5010%2C%20IPQ5018%2C%20IPQ5028%2C%20IPQ6000%2C%20IPQ6005%2C%20IPQ6010%2C%20IPQ6018%2C%20IPQ6028%2C%20IPQ8070%2C%20IPQ8070A%2C%20IPQ8071%2C%20IPQ8071A%2C%20IPQ8072%2C%20IPQ8072A%2C%20IPQ8074%2C%20IPQ8074A%2C%20IPQ8076%2C%20IPQ8076A%2C%20IPQ8078%2C%20IPQ8078A%2C%20IPQ8173%2C%20IPQ8174%2C%20MSM8996AU%2C%20PMP8074%2C%20QCA1023%2C%20QCA1062%2C%20QCA1064%2C%20QCA10901%2C%20QCA2062%2C%20QCA2064%2C%20QCA2065%2C%20QCA2066%2C%20QCA4010%2C%20QCA4020%2C%20QCA4024%2C%20QCA6174A%2C%20QCA6310%2C%20QCA6335%2C%20QCA6390%2C%20QCA6391%2C%20QCA6420%2C%20QCA6421%2C%20QCA6426%2C%20QCA6428%2C%20QCA6430%2C%20QCA6431%2C%20QCA6436%2C%20QCA6438%2C%20QCA6564AU%2C%20QCA6574%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6584AU%2C%20QCA6595AU%2C%20QCA6694%2C%20QCA6696%2C%20QCA8072%2C%20QCA8075%2C%20QCA8081%2C%20QCA9369%2C%20QCA9377%2C%20QCA9379%2C%20QCA9888%2C%20QCA9889%2C%20QCA9984%2C%20QCM2290%2C%20QCM4290%2C%20QCM6125%2C%20QCM6490%2C%20QCN5021%2C%20QCN5022%2C%20QCN5024%2C%20QCN5052%2C%20QCN5054%2C%20QCN5064%2C%20QCN5121%2C%20QCN5122%2C%20QCN5124%2C%20QCN5152%2C%20QCN5154%2C%20QCN5164%2C%20QCN5550%2C%20QCN6023%2C%20QCN6024%2C%20QCN6122%2C%20QCN7605%2C%20QCN7606%2C%20QCN9000%2C%20QCN9022%2C%20QCN9024%2C%20QCN9070%2C%20QCN9072%2C%20QCN9074%2C%20QCN9100%2C%20QCS2290%2C%20QCS405%2C%20QCS410%2C%20QCS4290%2C%20QCS605%2C%20QCS610%2C%20...%5Btruncated*%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20Buffer%20Overflow%20in%20WLAN&color=brightgreen) ### Description Possible stack overflow due to improper length check of TLV while copying the TLV to a local stack variable in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin #### Github No PoCs found on GitHub currently.