CVE-2023-24851

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
04/07/2023
Last modified:
11/08/2025

Description

Memory Corruption in WLAN HOST while parsing QMI response message from firmware.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*
cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*