JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation5 reference(s) from NVD