Generated remediation guidance and an executive summary. No account required.
A heap-based buffer over-read in Service_SetParamStringValue in cosa_x_cisco_com_ddns_dml.c of the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve information disclosure and code execution by crafting an AJAX call responsible for DDNS configuration with an exactly 64-byte username, password, or domain, for which the buffer size is insufficient for the final '\0' character. This is related to the CcspCommonLibrary and WebUI modules.
Cite this page
CVE-2019-6964. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2019-6964
Use CWE-125, Rdkcentral vendor hub and Rdkb Ccsppandm product page to widen CVE-2019-6964 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-6963, CVE-2019-6962 and CVE-2019-6961 for nearby disclosures in the same product family.