Vulnerabilities (CVE)

Filtered by vendor Getcujo Subscribe
Filtered by product Smart Firewall
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-4031 1 Getcujo 1 Smart Firewall 2022-06-07 10.0 HIGH 10.0 CRITICAL
An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability.
CVE-2018-3963 1 Getcujo 1 Smart Firewall 2020-08-24 8.3 HIGH 9.0 CRITICAL
An exploitable command injection vulnerability exists in the DHCP daemon configuration of the CUJO Smart Firewall. When adding a new static DHCP address, its corresponding hostname is inserted into the dhcpd.conf file without prior sanitization, allowing for arbitrary execution of system commands. To trigger this vulnerability, an attacker can send a DHCP request message and set up the corresponding static DHCP entry.
CVE-2018-4003 1 Getcujo 1 Smart Firewall 2020-08-24 7.5 HIGH 9.8 CRITICAL
An exploitable heap overflow vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. The string lengths are handled incorrectly when parsing character strings in mDNS resource records, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.
CVE-2018-3985 1 Getcujo 1 Smart Firewall 2019-04-01 7.5 HIGH 9.8 CRITICAL
An exploitable double free vulnerability exists in the mdnscap binary of the CUJO Smart Firewall. When parsing mDNS packets, a memory space is freed twice if an invalid query name is encountered, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.