No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shenzhen Libituo Technology
Shenzhen Libituo Technology lbt-t300-hw1 |
|
| Vendors & Products |
Shenzhen Libituo Technology
Shenzhen Libituo Technology lbt-t300-hw1 |
Sun, 03 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Shenzhen Libituo Technology LBT-T300-HW1 apply.cgi start_lan buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-05T00:33:11.256Z
Reserved: 2026-05-02T08:30:59.221Z
Link: CVE-2026-7675
Updated: 2026-05-05T00:33:07.402Z
Status : Deferred
Published: 2026-05-03T03:16:15.613
Modified: 2026-05-04T15:19:34.637
Link: CVE-2026-7675
No data.
OpenCVE Enrichment
Updated: 2026-05-04T16:06:38Z