Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
References
Link | Resource |
---|---|
https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Jun 2025, 20:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b - Broken Link | |
CPE | cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:* cpe:2.3:h:linksys:wap610n:-:*:*:*:*:*:*:* |
|
First Time |
Linksys wap610n
Linksys wap610n Firmware Linksys |
13 Feb 2025, 17:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
11 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 19:15
Updated : 2025-06-06 20:20
NVD link : CVE-2025-25522
Mitre link : CVE-2025-25522
CVE.ORG link : CVE-2025-25522
JSON object : View
Products Affected
linksys
- wap610n
- wap610n_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')