CVE-2023-27355
20.04.2023, 22:15
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MPEG-TS parser. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19773.Enginsight
Vendor | Product | Version |
---|---|---|
sonos | one_firmware | 70.3-35220 |
sonos | s1 | 𝑥 < 11.7.1 |
sonos | s2 | 𝑥 < 15.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration