Stack-Based Buffer Overflow in IP-COM W30AP Wireless Access Point
CVE-2026-2017
Key Information:
Badges
What is CVE-2026-2017?
A vulnerability exists in the IP-COM W30AP wireless access point that could lead to a stack-based buffer overflow due to improper handling of input in the R7WebsSecurityHandler function. Specifically, manipulation of the 'data' argument in the POST Request Handler (/goform/wx3auth) can allow attackers to execute code remotely. This flaw poses significant risks to network security, as it potentially allows unauthorized control over the affected devices. Early disclosures to the vendor received no response, indicating a critical need for user awareness and mitigation strategies.
Affected Version(s)
W30AP 1.0.0.11(1340)
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
