A stack-based buffer overflow in the CLI's TFTP file...
Moderate severity
Unreviewed
Published
Mar 18, 2026
to the GitHub Advisory Database
•
Updated Mar 18, 2026
Description
Published by the National Vulnerability Database
Mar 18, 2026
Published to the GitHub Advisory Database
Mar 18, 2026
Last updated
Mar 18, 2026
A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service.
References