Description
Red-M Red-Alert 2.7.5 with software 3.1 build 24 allows remote attackers to cause a denial of service (reboot and loss of logged events) via a long request to TCP port 80, possibly triggering a buffer overflow.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Bruno Morisson · textdoshardware
https://www.exploit-db.com/exploits/23672
References (9)
Core 9
Core References
Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/353211
Mailing List mailing-list
x_refsource_fulldisc
http://marc.info/?l=full-disclosure&m=107635119005407&w=2
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1009001
Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9618
Vendor Advisory vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3891
Vendor Advisory x_refsource_misc
http://www.securiteam.com/securitynews/5SP0C0KC0A.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15086
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10832
Vendor Advisory x_refsource_misc
http://genhex.org/releases/031003.txt
Scores
EPSS
0.1825
EPSS Percentile
95.2%
Details
Status
published
Products (1)
red-m/red-alert
2.7.5_v3.1_build_24
Published
Feb 09, 2004
Tracked Since
Feb 18, 2026