📦 Headunit Ntg6 Mercedes Benz User Experience
by Mercedes Benz
🔍 What is Headunit Ntg6 Mercedes Benz User Experience?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Mercedes-Benz NTG6 head units allows integer overflow in the Boost library when processing serialized archives via USB profile import/export functions. Attackers could potentiall...
This vulnerability in Mercedes-Benz NTG6 head units allows attackers to write arbitrary files with speech service privileges by exploiting insufficient validation when importing profile settings via U...
A null pointer dereference vulnerability in the Boost library used by Mercedes-Benz NTG6 head units allows potential denial of service or arbitrary code execution when processing malicious USB profile...
A heap buffer overflow vulnerability exists in the user data import/export function of Mercedes Benz NTG 6 head units. Attackers with physical access to the vehicle's USB interface can crash the User-...
A type confusion vulnerability exists in the user data import/export function of Mercedes Benz NTG 6 head units. Attackers with physical access to the vehicle's USB interface can cause the User-Data s...
This vulnerability in Mercedes-Benz NTG6 head units allows attackers with physical access to Ethernet pins to access the internal vehicle network. Through a race condition, they can spoof file paths a...