ID

VAR-202403-2113


CVE

CVE-2024-28283


TITLE

Linksys  of  E1000  Stack-based buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-025385

DESCRIPTION

There is stack-based buffer overflow vulnerability in pc_change_act function in Linksys E1000 router firmware version v.2.1.03 and before, leading to remote code execution. (DoS) It may be in a state. Linksys E1000 is a router from Linksys, an American company. The vulnerability is caused by the failure to check the buffer input size. Remote attackers can exploit this vulnerability to cause denial of service or code execution

Trust: 2.16

sources: NVD: CVE-2024-28283 // JVNDB: JVNDB-2024-025385 // CNVD: CNVD-2025-02170

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-02170

AFFECTED PRODUCTS

vendor:linksysmodel:e1000scope:lteversion:2.1.03

Trust: 1.0

vendor:linksysmodel:e1000scope:eqversion: -

Trust: 0.8

vendor:linksysmodel:e1000scope:lteversion:e1000 firmware 2.1.03 and earlier

Trust: 0.8

vendor:linksysmodel:e1000scope: - version: -

Trust: 0.8

vendor:linksysmodel:e1000scope:lteversion:<=2.1.03

Trust: 0.6

sources: CNVD: CNVD-2025-02170 // JVNDB: JVNDB-2024-025385 // NVD: CVE-2024-28283

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-28283
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2024-025385
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2025-02170
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-02170
severity: MEDIUM
baseScore: 6.5
vectorString: AV:L/AC:L/AU:M/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 2.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-28283
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-025385
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-02170 // JVNDB: JVNDB-2024-025385 // NVD: CVE-2024-28283

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-025385 // NVD: CVE-2024-28283

EXTERNAL IDS

db:NVDid:CVE-2024-28283

Trust: 3.2

db:JVNDBid:JVNDB-2024-025385

Trust: 0.8

db:CNVDid:CNVD-2025-02170

Trust: 0.6

sources: CNVD: CNVD-2025-02170 // JVNDB: JVNDB-2024-025385 // NVD: CVE-2024-28283

REFERENCES

url:https://d05004.notion.site/linksys-e1000-bof-37b98eec45ea4fc991b9b5bea3db091d?pvs=4

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-28283

Trust: 1.4

sources: CNVD: CNVD-2025-02170 // JVNDB: JVNDB-2024-025385 // NVD: CVE-2024-28283

SOURCES

db:CNVDid:CNVD-2025-02170
db:JVNDBid:JVNDB-2024-025385
db:NVDid:CVE-2024-28283

LAST UPDATE DATE

2025-06-28T23:40:25.365000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-02170date:2025-01-22T00:00:00
db:JVNDBid:JVNDB-2024-025385date:2025-06-25T06:21:00
db:NVDid:CVE-2024-28283date:2025-06-10T15:52:54.640

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-02170date:2025-01-15T00:00:00
db:JVNDBid:JVNDB-2024-025385date:2025-06-25T00:00:00
db:NVDid:CVE-2024-28283date:2024-03-19T21:15:07.770