Description
Tasmota before commit 066878da4d4762a9b6cb169fdf353e804d735cfd was discovered to contain a stack overflow via the ClientPortPtr parameter at lib/libesp32/rtsp/CRtspSession.cpp.
References
https://github.com/arendst/Tasmota/pull/16802
PatchThird Party Advisory
https://github.com/arendst/Tasmota/pull/16802/commits/066878da4d4762a9b6cb169fdf353e804d735cfd
PatchThird Party Advisory
https://github.com/arendst/Tasmota/pull/16802
PatchThird Party Advisory
https://github.com/arendst/Tasmota/pull/16802/commits/066878da4d4762a9b6cb169fdf353e804d735cfd
PatchThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2022-11-14T21:15:14.047Z
3 years agoLast modified
2025-04-30T17:15:52.750Z
10 months ago