Unrated severityNVD Advisory· Published May 21, 2015· Updated May 6, 2026
CVE-2015-3036
CVE-2015-3036
Description
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.kb.cert.org/vuls/id/177092nvdThird Party AdvisoryUS Government Resource
- blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.htmlnvd
- packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.htmlnvd
- packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.htmlnvd
- seclists.org/fulldisclosure/2015/May/74nvd
- seclists.org/fulldisclosure/2015/Oct/50nvd
- www.securityfocus.com/bid/74724nvd
- www.securitytracker.com/id/1032377nvd
- www.exploit-db.com/exploits/38454/nvd
- www.exploit-db.com/exploits/38566/nvd
- www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txtnvd
News mentions
0No linked articles in our index yet.