Логотип exploitDog
bind:CVE-2025-60695
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60695

Количество 3

Количество 3

nvd логотип

CVE-2025-60695

3 месяца назад

A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-777q-xq36-w3q5

3 месяца назад

A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2025-14914

4 месяца назад

Уязвимость функции sub_4045A8() микропрограммного обеспечения маршрутизаторов Linksys E7350, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60695

A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.

CVSS3: 5.9
0%
Низкий
3 месяца назад
github логотип
GHSA-777q-xq36-w3q5

A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.

CVSS3: 5.9
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14914

Уязвимость функции sub_4045A8() микропрограммного обеспечения маршрутизаторов Linksys E7350, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 5.9
0%
Низкий
4 месяца назад

Уязвимостей на страницу