Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-40363 PoC — Flipper Devices Flipper Zero 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Flipper Devices Flipper Zero 缓冲区错误漏洞 (CVE-2022-40363)
Description:Flipper Devices Flipper Zero是Flipper Devices公司的一款便携式多功能工具。适用于渗透测试者和黑客。 Flipper Devices Flipper Zero v0.65.2之前版本存在安全漏洞,该漏洞源于Flipper Devices Inc. 的组件 nfc_device_load_mifare_ul_data 中的缓冲区溢出,攻击者利用该漏洞可以通过精心制作的 NFC 文件导致拒绝服务。
Description
A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file. CVE project by @Sn0wAlice
Readme
# CVE-2022-40363

A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.

| authentication | complexity | vector |
| --- | --- | --- |
| not available | not available | not available |

| confidentiality | integrity | availability |
| --- | --- | --- |
| not available | not available | not available |

## CVSS Score: **not available**

## References

* https://vvx7.io/posts/2022/09/your-amiibos-haunted/

* https://github.com/flipperdevices/flipperzero-firmware/pull/1697

## Brut File

* [CVE-2022-40363.json](./data_brut.json)



## About this repository
This repository is part of the project [Live Hack CVE](https://github.com/Live-Hack-CVE). Made by [Sn0wAlice](https://github.com/Sn0wAlice) for the people that care about security and need to have a feed of the latest CVEs. Hope you enjoy it, don't forget to star the repo and follow me on [Twitter](https://twitter.com/Sn0wAlice) and [Github](https://github.com/Sn0wAlice)
File Snapshot

[4.0K] /data/pocs/c5f1544cd6fb3ce2c418641ab820a47fc861f8fb ├── [1.1K] data_brut.json └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.