### [CVE-2021-34587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34587) ![](https://img.shields.io/static/v1?label=Product&message=CC612&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CC613&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC15xx&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ICC16xx&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.11.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.12.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.13.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.20.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brightgreen) ### Description In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable. ### POC #### Reference - https://cert.vde.com/en/advisories/VDE-2021-047 #### Github No PoCs found on GitHub currently.