Логотип exploitDog
bind:CVE-2025-7623
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-7623

Количество 2

Количество 2

nvd логотип

CVE-2025-7623

3 месяца назад

Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-95mg-3279-c5xh

3 месяца назад

Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-7623

Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

CVSS3: 5.4
0%
Низкий
3 месяца назад
github логотип
GHSA-95mg-3279-c5xh

Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

CVSS3: 5.4
0%
Низкий
3 месяца назад

Уязвимостей на страницу