CVE-2025-25522

Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wap610n:-:*:*:*:*:*:*:*

History

06 Jun 2025, 20:20

Type Values Removed Values Added
References () https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b - () https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b - Broken Link
CPE cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wap610n:-:*:*:*:*:*:*:*
First Time Linksys wap610n
Linksys wap610n Firmware
Linksys

13 Feb 2025, 17:17

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de desbordamiento de búfer en Linksys WAP610N v1.0.05.002 debido a la falta de verificación de longitud, que está relacionada con la operación de configuración de la hora. El atacante puede controlar directamente el dispositivo de destino remoto explotando con éxito esta vulnerabilidad.
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

11 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-11 19:15

Updated : 2025-06-06 20:20


NVD link : CVE-2025-25522

Mitre link : CVE-2025-25522

CVE.ORG link : CVE-2025-25522


JSON object : View

Products Affected

linksys

  • wap610n
  • wap610n_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')