Files
CVEs-PoC/2021/CVE-2021-1979.md
2025-09-29 21:09:30 +02:00

18 lines
2.4 KiB
Markdown

### [CVE-2021-1979](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1979)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=AQT1000%2C%20AR8035%2C%20CSRB31024%2C%20FSM10055%2C%20FSM10056%2C%20MDM9150%2C%20MDM9250%2C%20MDM9650%2C%20QCA6174A%2C%20QCA6310%2C%20QCA6320%2C%20QCA6335%2C%20QCA6390%2C%20QCA6391%2C%20QCA6420%2C%20QCA6421%2C%20QCA6426%2C%20QCA6430%2C%20QCA6431%2C%20QCA6436%2C%20QCA6564A%2C%20QCA6564AU%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6584AU%2C%20QCA6595AU%2C%20QCA6696%2C%20QCA8081%2C%20QCA8337%2C%20QCA9377%2C%20QCM6125%2C%20QCM6490%2C%20QCS410%2C%20QCS603%2C%20QCS605%2C%20QCS610%2C%20QCS6125%2C%20QCS6490%2C%20QCX315%2C%20QSM8350%2C%20SA415M%2C%20SA515M%2C%20SA8155%2C%20SA8155P%2C%20SC8180X%2BSDX55%2C%20SD%20455%2C%20SD%20636%2C%20SD%20675%2C%20SD%208C%2C%20SD%208CX%2C%20SD480%2C%20SD660%2C%20SD665%2C%20SD670%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD710%2C%20SD712%2C%20SD720G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD778G%2C%20SD780G%2C%20SD7c%2C%20SD835%2C%20SD845%2C%20SD850%2C%20SD855%2C%20SD865%205G%2C%20SD870%2C%20SD888%205G%2C%20SDM630%2C%20SDX12%2C%20SDX20%2C%20SDX24%2C%20SDX50M%2C%20SDX55%2C%20SDX55M%2C%20SDX65%2C%20SDXR1%2C%20SDXR2%205G%2C%20SM6250%2C%20SM6250P%2C%20SM6375%2C%20SM7250%2C%20SM7325%2C%20SM8450%2C%20SM8450P%2C%20WCD9326%2C%20WCD9335%2C%20WCD9340%2C%20WCD9341%2C%20WCD9360%2C%20WCD9370%2C%20WCD9371%2C%20WCD9375%2C%20WCD9380%2C%20WCD9385%2C%20WCN3910%2C%20WCN3950%2C%20WCN3980%2C%20WCN3988%2C%20WCN3990%2C%20WCN3991%2C%20WCN3998%2C%20WCN6740%2C%20WCN6750%2C%20WCN6850%2C%20WCN6851%2C%20WCN6855%2C%20WCN6856%2C%20WCN7850%2C%20WCN7851%2C%20WHS9%20...%5Btruncated*%5D%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20Buffer%20Overflow%20in%20RFA%20Tools&color=brightgreen)
### Description
Possible buffer overflow due to improper validation of FTM command payload in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin
#### Github
No PoCs found on GitHub currently.