Files
CVEs-PoC/2021/CVE-2021-41193.md
2025-09-29 21:09:30 +02:00

19 lines
916 B
Markdown

### [CVE-2021-41193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41193)
![](https://img.shields.io/static/v1?label=Product&message=wire-avs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%207.1.12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String&color=brightgreen)
### Description
wire-avs is the audio visual signaling (AVS) component of Wire, an open-source messenger. A remote format string vulnerability in versions prior to 7.1.12 allows an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 7.1.12. There are currently no known workarounds.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Wala-Alnozmai/SVD-Benchmark
- https://github.com/oananbeh/LLM-Java-SVR-Benchmark