A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.2-beta3 is sufficient to resolve this issue. You should upgrade the affected component.
References
Link | Resource |
---|---|
https://drive.google.com/file/d/1DcQWaTmj1HSbRidOCWwe9vtgHsBnFuX7/view?usp=sharing | Exploit |
https://github.com/appneta/tcpreplay/issues/973 | Exploit Issue Tracking Vendor Advisory |
https://vuldb.com/?ctiid.321219 | Permissions Required VDB Entry |
https://vuldb.com/?id.321219 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.630498 | Third Party Advisory VDB Entry |
Configurations
History
06 Oct 2025, 18:26
Type | Values Removed | Values Added |
---|---|---|
First Time |
Broadcom
Broadcom tcpreplay |
|
CPE | cpe:2.3:a:broadcom:tcpreplay:*:*:*:*:*:*:*:* | |
References | () https://drive.google.com/file/d/1DcQWaTmj1HSbRidOCWwe9vtgHsBnFuX7/view?usp=sharing - Exploit | |
References | () https://github.com/appneta/tcpreplay/issues/973 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://vuldb.com/?ctiid.321219 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.321219 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.630498 - Third Party Advisory, VDB Entry |
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Aug 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-24 11:15
Updated : 2025-10-06 18:26
NVD link : CVE-2025-9386
Mitre link : CVE-2025-9386
CVE.ORG link : CVE-2025-9386
JSON object : View
Products Affected
broadcom
- tcpreplay