{ "schema_version": "1.4.0", "id": "GHSA-xh62-mxvq-v84j", "modified": "2022-05-24T17:30:44Z", "published": "2022-05-24T17:30:44Z", "aliases": [ "CVE-2020-25858" ], "details": "The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25858" }, { "type": "WEB", "url": "http://vdoo.com/blog/qualcomm-qcmap-vulnerabilities" } ], "database_specific": { "cwe_ids": [ "CWE-476" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-10-15T16:15:00Z" } }