A stack buffer overflow vulnerability exists in the buffer_get function of duc, a disk management tool, where a condition can evaluate to true due to underflow, allowing an out-of-bounds read.
References
| Link | Resource |
|---|---|
| https://github.com/zevv/duc/releases/tag/1.4.6 | Release Notes |
| https://hackingbydoing.wixsite.com/hackingbydoing/post/stack-buffer-overflow-in-duc | Exploit Third Party Advisory |
| https://kb.cert.org/vuls/id/441887 | Third Party Advisory |
| https://www.kb.cert.org/vuls/id/441887 | Third Party Advisory |
Configurations
History
17 Dec 2025, 15:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zevv/duc/releases/tag/1.4.6 - Release Notes | |
| References | () https://hackingbydoing.wixsite.com/hackingbydoing/post/stack-buffer-overflow-in-duc - Exploit, Third Party Advisory | |
| References | () https://kb.cert.org/vuls/id/441887 - Third Party Advisory | |
| References | () https://www.kb.cert.org/vuls/id/441887 - Third Party Advisory | |
| First Time |
Zevv
Zevv duc |
|
| CPE | cpe:2.3:a:zevv:duc:*:*:*:*:*:*:*:* | |
| CWE | CWE-787 |
05 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
05 Dec 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Dec 2025, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-05 13:16
Updated : 2025-12-17 15:31
NVD link : CVE-2025-13654
Mitre link : CVE-2025-13654
CVE.ORG link : CVE-2025-13654
JSON object : View
Products Affected
zevv
- duc
CWE
CWE-787
Out-of-bounds Write
