The Intersil isl3893 extensions for Boa 0.93.15, as used on the FreeLan RO80211G-AP and other devices, do not prevent stack writes from entering memory locations used for string constants, which allows remote attackers to change the admin password stored in memory via a long username in an HTTP Basic Authentication request.
Published 2007-09-17 17:17:00
Updated 2018-10-15 21:38:47
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Input validation

Products affected by CVE-2007-4915

Exploit prediction scoring system (EPSS) score for CVE-2007-4915

77.16%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2007-4915

  • Intersil (Boa) HTTPd Basic Authentication Password Reset
    Disclosure Date: 2007-09-10
    First seen: 2020-04-26
    auxiliary/admin/http/intersil_pass_reset
    The Intersil extension in the Boa HTTP Server 0.93.x - 0.94.11 allows basic authentication bypass when the user string is greater than 127 bytes long. The long string causes the password to be overwritten in memory, which enables the attacker to reset the

CVSS scores for CVE-2007-4915

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST

CWE ids for CVE-2007-4915

  • The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
    Assigned by: nvd@nist.gov (Primary)
Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!