Логотип exploitDog
bind:CVE-2025-8819
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-8819

Количество 3

Количество 3

nvd логотип

CVE-2025-8819

19 дней назад

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function setWan of the file /goform/setWan. The manipulation of the argument staticIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-m882-f339-xw29

19 дней назад

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function setWan of the file /goform/setWan. The manipulation of the argument staticIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-09735

29 дней назад

Уязвимость функции setWan() микропрограммного обеспечения маршрутизаторов Linksys RE6250, RE6300, RE6350, RE6500, RE7000 и RE9000, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-8819

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function setWan of the file /goform/setWan. The manipulation of the argument staticIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
0%
Низкий
19 дней назад
github логотип
GHSA-m882-f339-xw29

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function setWan of the file /goform/setWan. The manipulation of the argument staticIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 8.8
0%
Низкий
19 дней назад
fstec логотип
BDU:2025-09735

Уязвимость функции setWan() микропрограммного обеспечения маршрутизаторов Linksys RE6250, RE6300, RE6350, RE6500, RE7000 и RE9000, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
29 дней назад

Уязвимостей на страницу