CVE-2021-4464
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fiberhome | an5506-04-fa | rp2602 |
| fiberhome | an5506-04-fa | rp2631 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in the FiberHome AN5506-04-FA firmware's HTTP service ('webs'). It occurs because the service does not enforce a maximum length for Cookie header values. When a cookie longer than 511 bytes is processed, it overruns the stack buffer, which can cause the device to crash or potentially allow an attacker to control the execution flow.
How can this vulnerability impact me? :
The vulnerability can lead to a crash of the device or potentially allow an attacker to execute arbitrary code by controlling the execution flow. This could result in denial of service or unauthorized control over the affected device.