CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-6198: SNORE Interface Unauthenticated Remote Code Execution

7.7 CVSS

Description

The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker
with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.

Classification

CVE ID: CVE-2024-6198

CVSS Base Severity: HIGH

CVSS Base Score: 7.7

CVSS Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y/R:U/V:C/RE:M/U:Red

Problem Types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Affected Products

Vendor: ViaSat, Viasat

Product: RM4100, RM4200, EM4100, RM5110, RM5111, RG1000, RG1100, EG1000, EG1020

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 7.5% (scored less or equal to compared to others)

EPSS Date: 2025-05-24 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-6198
https://www.onekey.com/resource/security-advisory-rce-on-viasat-modems-cve-2024-6198

Timeline