A vulnerability was found in iop-apl-uw basestation3 up to 3.0.4 and classified as problematic. This issue affects the function load_qc_pickl of the file basestation3/QC.py. The manipulation of the argument qc_file leads to deserialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The code maintainer tagged the issue as closed. But there is no new commit nor release in the GitHub repository available so far.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://vuldb.com/?id.309461 | vdb entry technical description third party advisory |
https://vuldb.com/?ctiid.309461 | signature permissions required vdb entry |
https://vuldb.com/?submit.578074 | third party advisory vdb entry |
https://github.com/iop-apl-uw/basestation3/issues/6 | exploit issue tracking |
https://github.com/iop-apl-uw/basestation3/issues/6#event-17672013757 | exploit issue tracking |
https://github.com/iop-apl-uw/basestation3/issues/6#issue-3066055868 | exploit issue tracking |