An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command.
References
| Link | Resource |
|---|---|
| https://github.com/weston-embedded/uC-FTPs/pull/2 | Patch |
| https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 | Exploit Mitigation Third Party Advisory |
| https://github.com/weston-embedded/uC-FTPs/pull/2 | Patch |
| https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 | Exploit Mitigation Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1681 |
Configurations
History
04 Nov 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2023-05-10 16:15
Updated : 2025-11-04 20:16
NVD link : CVE-2022-46378
Mitre link : CVE-2022-46378
CVE.ORG link : CVE-2022-46378
JSON object : View
Products Affected
weston-embedded
- uc-ftps
