📦 Gecko Os
by Silabs
🔍 What is Gecko Os?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A stack-based buffer overflow vulnerability in Silicon Labs Gecko OS HTTP request handling allows network-adjacent attackers to execute arbitrary code without authentication. This affects devices runn...
This is a buffer overflow vulnerability in Silicon Labs Gecko OS that allows network-adjacent attackers to execute arbitrary code without authentication by sending specially crafted HTTP GET requests....
This is a buffer overflow vulnerability in Silicon Labs Gecko OS that allows network-adjacent attackers to execute arbitrary code without authentication by exploiting improper length validation in the...
A stack-based buffer overflow in Silicon Labs Gecko OS debug interface allows network-adjacent attackers to execute arbitrary code without authentication. This affects devices running vulnerable Gecko...
This vulnerability allows network-adjacent attackers to cause a denial-of-service condition on Silicon Labs Gecko OS devices by sending specially crafted DNS responses that trigger an infinite loop. N...