Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5f76-qg5w-x9vh

Опубликовано: 10 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function setOpMode of the file /goform/setOpMode. The manipulation of the argument ethConv leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function setOpMode of the file /goform/setOpMode. The manipulation of the argument ethConv leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 27%
0.00092
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 8.8
nvd
19 дней назад

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function setOpMode of the file /goform/setOpMode. The manipulation of the argument ethConv leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
fstec
29 дней назад

Уязвимость функции setOpMode() микропрограммного обеспечения маршрутизаторов Linksys RE6250, RE6300, RE6350, RE6500, RE7000 и RE9000, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 27%
0.00092
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119