A weakness has been identified in H3C Magic B0 up to 100R002. This impacts the function EditWlanMacList of the file /goform/aspForm. This manipulation of the argument param causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/HungryGoogle/log_attack/blob/main/index2/2.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.334256 | Permissions Required VDB Entry |
| https://vuldb.com/?id.334256 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.694755 | Third Party Advisory VDB Entry |
| https://github.com/HungryGoogle/log_attack/blob/main/index2/2.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
23 Dec 2025, 00:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:h3c:magic_b0_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:h3c:magic_b0:-:*:*:*:*:*:*:* |
|
| First Time |
H3c magic B0 Firmware
H3c H3c magic B0 |
|
| References | () https://github.com/HungryGoogle/log_attack/blob/main/index2/2.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.334256 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.334256 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.694755 - Third Party Advisory, VDB Entry |
05 Dec 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/HungryGoogle/log_attack/blob/main/index2/2.md - |
04 Dec 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-04 19:16
Updated : 2025-12-23 00:27
NVD link : CVE-2025-14015
Mitre link : CVE-2025-14015
CVE.ORG link : CVE-2025-14015
JSON object : View
Products Affected
h3c
- magic_b0
- magic_b0_firmware
