An issue exists in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ethernut nut\\/os |