{ "schema_version": "1.4.0", "id": "GHSA-xvxf-7p3q-7mmg", "modified": "2024-03-21T03:34:13Z", "published": "2022-06-03T00:01:02Z", "aliases": [ "CVE-2022-24702" ], "details": "** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24702" }, { "type": "WEB", "url": "https://github.com/Coalfire-Research/WinAPRS-Exploits" }, { "type": "WEB", "url": "https://news.ycombinator.com/item?id=31571476" }, { "type": "WEB", "url": "https://winaprs.com" }, { "type": "WEB", "url": "https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1" } ], "database_specific": { "cwe_ids": [ "CWE-120" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-06-02T14:15:00Z" } }