|CVSS SCORE||6.3, (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)|
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installation of ConnMan. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the received_data method. Crafted data in a HTTP response can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the ConnMan process.
This vulnerability was demonstrated on a Tesla Model 3 during Pwn2Own 2022 Vancouver competition.
ConnMan has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||David BERARD and Vincent DEHORS from @Synacktiv