Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
2024-12-05T14:15:20.850
2025-11-06T16:43:04.740
Analyzed
CVSSv3.1: 7.5 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | sonicwall | sma_200_firmware | < 10.2.1.14-75sv | Yes |
| Hardware | sonicwall | sma_200 | - | No |
| Operating System | sonicwall | sma_210_firmware | < 10.2.1.14-75sv | Yes |
| Hardware | sonicwall | sma_210 | - | No |
| Operating System | sonicwall | sma_400_firmware | < 10.2.1.14-75sv | Yes |
| Hardware | sonicwall | sma_400 | - | No |
| Operating System | sonicwall | sma_410_firmware | < 10.2.1.14-75sv | Yes |
| Hardware | sonicwall | sma_410 | - | No |
| Operating System | sonicwall | sma_500v_firmware | < 10.2.1.14-75sv | Yes |
| Hardware | sonicwall | sma_500v | - | No |