Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system
References
Configurations
No configuration.
History
18 Nov 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system |
18 Nov 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 07:15
Updated : 2025-11-18 14:06
NVD link : CVE-2025-7623
Mitre link : CVE-2025-7623
CVE.ORG link : CVE-2025-7623
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow
