Files
CVEs-PoC/2021/CVE-2021-30331.md
2025-09-29 21:09:30 +02:00

18 lines
1.9 KiB
Markdown

### [CVE-2021-30331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30331)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=AR8035%2C%20FSM10055%2C%20FSM10056%2C%20MDM9150%2C%20MDM9650%2C%20QCA6174A%2C%20QCA6390%2C%20QCA6391%2C%20QCA6426%2C%20QCA6436%2C%20QCA8081%2C%20QCA8337%2C%20QCA9377%2C%20QCM2290%2C%20QCM4290%2C%20QCM6125%2C%20QCM6490%2C%20QCS2290%2C%20QCS410%2C%20QCS4290%2C%20QCS610%2C%20QCS6125%2C%20QCS6490%2C%20QCX315%2C%20SD%20675%2C%20SD%208%20Gen1%205G%2C%20SD460%2C%20SD480%2C%20SD662%2C%20SD665%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD720G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD778G%2C%20SD865%205G%2C%20SD870%2C%20SD888%205G%2C%20SDX55%2C%20SDX55M%2C%20SDX65%2C%20SDXR2%205G%2C%20SM6225%2C%20SM6250%2C%20SM6250P%2C%20SM6375%2C%20SM7250P%2C%20SM7325P%2C%20SW5100%2C%20SW5100P%2C%20WCD9335%2C%20WCD9341%2C%20WCD9370%2C%20WCD9375%2C%20WCD9380%2C%20WCD9385%2C%20WCN3910%2C%20WCN3950%2C%20WCN3980%2C%20WCN3988%2C%20WCN3990%2C%20WCN3991%2C%20WCN3998%2C%20WCN6750%2C%20WCN6850%2C%20WCN6851%2C%20WCN6855%2C%20WCN6856%2C%20WSA8810%2C%20WSA8815%2C%20WSA8830%2C%20WSA8835%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Exposure%20in%20Data%20Modem&color=brightgreen)
### Description
Possible buffer overflow due to improper data validation of external commands sent via DIAG interface in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/march-2022-bulletin
#### Github
No PoCs found on GitHub currently.