제출 #578074: iop-apl-uw basestation3 3.0.4 Deserialization정보

제목iop-apl-uw basestation3 3.0.4 Deserialization
설명In the basestation3 github repository, the function load_qc_pickl() in QC.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability. This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls.
원천⚠️ https://github.com/iop-apl-uw/basestation3/issues/6
사용자
 esharmaji (UID 84358)
제출2025. 05. 15. PM 02:28 (11 개월 ago)
모더레이션2025. 05. 17. PM 03:13 (2 days later)
상태수락
VulDB 항목309461 [iop-apl-uw basestation3 까지 3.0.4 basestation3/QC.py load_qc_pickl qc_file 권한 상승]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!