exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Qian Chen

First Active2019-07-24
Last Active2021-07-07
MikroTik RouterOS 6.x Reachable Assertion Failure / Null Pointer Dereference
Posted Jul 7, 2021
Authored by Qian Chen

MikroTik RouterOS version 6.x suffers from having multiple null pointer dereference vulnerabilities and a reachable assertion failure.

tags | advisory, vulnerability
advisories | CVE-2021-36613, CVE-2021-36614
SHA-256 | 61fb6d95549c6db4fbf408527ea47e6a0fd075a931405f09c2ed3b080657a245
MikroTik RouterOS Memory Corruption
Posted May 11, 2021
Authored by Qian Chen

MikroTik's RouterOS suffers from multiple memory corruption vulnerabilities. Various versions are affected.

tags | advisory, vulnerability
advisories | CVE-2020-20220, CVE-2020-20227, CVE-2020-20245, CVE-2020-20246
SHA-256 | db5d7fa65930b9710b80f0c424d888eade1e18945b75c10be7be6d7c0cc4bcf5
Mikrotik RouterOS 6.46.5 Memory Corruption / Assertion Failure
Posted May 10, 2021
Authored by Qian Chen

MikroTik RouterOS version 6.46.5 suffers from an assertion failure and multiple memory corruption vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2020-20214, CVE-2020-20222, CVE-2020-20236, CVE-2020-20237
SHA-256 | a64685676fca951c82952a48568cc23b987ea04f6128ac9fa93f1d10f7bfbe11
MikroTik RouterOS Memory Corruption / Reachable Assertion Failure
Posted Sep 11, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from memory corruption and reachable assertion failure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 55015f99b97a602f7b921cc66a0bad419e61030ea1560cd3d297e3259fc64e59
MikroTik RouterOS Memory Corruption / NULL Pointer Dereference / Division By Zero
Posted Aug 30, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from NULL pointer dereference, memory corruption and division by zero vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 093cf827a466522125a9a60ebaa8035bdab73e9adbf53421b45d078526ed91b9
Mikrotik RouterOS NULL Pointer Dereference / Reachable Assertion Failure
Posted Aug 14, 2020
Authored by Qian Chen

Mikrotik RouterOS suffers from null pointer dereference and reachable assertion failure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 2df20ffb503d40f9cb6c783de8944c6f8ddb31e97c0d49da69d0f06ea89a0ad1
MikroTik RouterOS Memory Corruption / NULL Pointer / Stack Exhaustion
Posted Jul 27, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from stack exhaustion, memory corruption, and null pointer vulnerabilities. Various 6.44.x versions are affected.

tags | advisory, vulnerability
SHA-256 | 02ab3540de562be70a067e64bdbfd57ec8076c2736ff3eb6a847230788c021a5
MikroTik RouterOS Null Pointer Dereference / Division-By-Zero
Posted Jul 7, 2020
Authored by Qian Chen

MikroTik RouterOS versions prior to stable 6.47 suffer from multiple null pointer dereference vulnerabilities and one division-by-zero vulnerability.

tags | advisory, vulnerability
SHA-256 | f62eaf7184c39f0e8b90c063e78e3e3b83c3de4f01b45d8555571c1e7818d1df
MikroTik RouterOS Denial Of Service / Memory Corruption
Posted May 12, 2020
Authored by Qian Chen

MikroTik RouterOS suffers from two vulnerabilities. The cerm process suffers from an uncontrolled resource consumption issue. By sending a crafted packet, an authenticated remote user can cause a high cpu load, which may make the device respond slowly or unable to respond. Versions until stable 6.45.7 are affected. The traceroute process suffers from a memory corruption issue. By sending a crafted packet, an authenticated remote user can crash the traceroute process due to invalid memory access. Versions until stable 6.46.4 are affected.

tags | advisory, remote, denial of service, vulnerability
SHA-256 | 77175816ac4a79fca801187367574009b954279dd3a15515035cbab28819403d
MikroTik RouterOS Memory Corruption / Failed Assertion
Posted Jan 7, 2020
Authored by Qian Chen

MikroTik RouterOS versions prior to 6.44.6 suffer from memory corruption and assertion failure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | b9e283a6208f56a952f99e2174e47221c663e9cd7c8f17571ff9c7c8eeb5c785
Mikrotik RouterOS Resource / Stack Exhaustion
Posted Jul 24, 2019
Authored by Qian Chen

Mikrotik RouterOS versions prior to 6.44.5 and 6.45.1 suffer from stack and resource exhaustion vulnerabilities.

tags | advisory, denial of service, vulnerability
advisories | CVE-2019-13954, CVE-2019-13955
SHA-256 | d3abfc481e4ff650ba817b959c8db1aeed9b4e0a9043efaf38c59c7dd9c780de
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close