Пожалуйста, обратите внимание, что пользователь заблокирован
Upon analysis, the impact of this vulnerability seems much less critical than what Microsoft anticipated. We can only overwrite another packet (limited number of bytes) if it is placed straight after our one, which is very unlikely and useless, as no interesting data there can be leveraged to take control of the execution flow. Anyway, we would love to be proven wrong, as this seems a very cool exploitation vector.
Link: https://www.crowdfense.com/windows-wi-fi-driver-rce-vulnerability-cve-2024-30078/
Link: https://www.crowdfense.com/windows-wi-fi-driver-rce-vulnerability-cve-2024-30078/