Files
CVEs-PoC/2021/CVE-2021-25306.md
2025-09-29 21:09:30 +02:00

18 lines
825 B
Markdown

### [CVE-2021-25306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25306)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
A buffer overflow vulnerability in the AT command interface of Gigaset DX600A v41.00-175 devices allows remote attackers to force a device reboot by sending relatively long AT commands.
### POC
#### Reference
- https://research.nccgroup.com/2021/02/28/technical-advisory-administrative-passcode-recovery-and-authenticated-remote-buffer-overflow-vulnerabilities-in-gigaset-dx600a-handset-cve-2021-25309-cve-2021-25306/
#### Github
No PoCs found on GitHub currently.