CVE-2025-25522

Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wap610n:-:*:*:*:*:*:*:*

History

06 Jun 2025, 20:20

Type Values Removed Values Added
First Time Linksys
Linksys wap610n Firmware
Linksys wap610n
CPE cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wap610n:-:*:*:*:*:*:*:*
References () https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b - () https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b - Broken Link

13 Feb 2025, 17:17

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
Summary
  • (es) Vulnerabilidad de desbordamiento de búfer en Linksys WAP610N v1.0.05.002 debido a la falta de verificación de longitud, que está relacionada con la operación de configuración de la hora. El atacante puede controlar directamente el dispositivo de destino remoto explotando con éxito esta vulnerabilidad.

11 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-11 19:15

Updated : 2025-06-06 20:20


NVD link : CVE-2025-25522

Mitre link : CVE-2025-25522

CVE.ORG link : CVE-2025-25522


JSON object : View

Products Affected

linksys

  • wap610n_firmware
  • wap610n
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')