7.3
CVE-2025-25522
- EPSS 0.04%
- Veröffentlicht 11.02.2025 19:15:18
- Zuletzt bearbeitet 06.06.2025 20:20:50
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linksys ≫ Wap610n Firmware Version1.0.05.002
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.101 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.3 | 2.5 | 4.7 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.