Vulnerabilities (CVE)

Filtered by CWE-121
Total 1862 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-28026 1 Totolink 8 A3000ru, A3000ru Firmware, A3100r and 5 more 2025-05-07 N/A 7.3 HIGH
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi.
CVE-2025-28027 1 Totolink 8 A3000ru, A3000ru Firmware, A3100r and 5 more 2025-05-07 N/A 7.3 HIGH
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 was found to contain a buffer overflow vulnerability in downloadFile.cgi.
CVE-2023-6693 3 Fedoraproject, Qemu, Redhat 3 Fedora, Qemu, Enterprise Linux 2025-05-06 N/A 4.9 MEDIUM
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
CVE-2025-22457 1 Ivanti 3 Connect Secure, Neurons For Zero-trust Access, Policy Secure 2025-05-03 N/A 9.0 CRITICAL
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
CVE-2025-28144 1 Edimax 2 Br-6478ac V3, Br-6478ac V3 Firmware 2025-05-02 N/A 6.5 MEDIUM
Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a stack overflow vlunerability via peerPin parameter in the formWsc function.
CVE-2025-25741 1 Dlink 2 Dir-853, Dir-853 Firmware 2025-05-02 N/A 5.4 MEDIUM
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module.
CVE-2025-25740 1 Dlink 2 Dir-853, Dir-853 Firmware 2025-05-02 N/A 5.5 MEDIUM
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module.
CVE-2025-25745 1 Dlink 2 Dir-853, Dir-853 Firmware 2025-05-02 N/A 8.8 HIGH
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetQuickVPNSettings module.
CVE-2025-25891 1 Dlink 2 Dsl-3782, Dsl-3782 Firmware 2025-05-02 N/A 5.7 MEDIUM
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2025-25892 1 Dlink 2 Dsl-3782, Dsl-3782 Firmware 2025-05-02 N/A 5.7 MEDIUM
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2025-25896 1 Dlink 2 Dsl-3782, Dsl-3782 Firmware 2025-05-02 N/A 5.7 MEDIUM
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2025-45428 1 Tenda 2 Ac9, Ac9 Firmware 2025-04-30 N/A 9.8 CRITICAL
In Tenda ac9 v1.0 with firmware V15.03.05.14_multi, the rebootTime parameter of /goform/SetSysAutoRebbotCfg has a stack overflow vulnerability, which can lead to remote arbitrary code execution.
CVE-2025-45429 1 Tenda 2 Ac9, Ac9 Firmware 2025-04-30 N/A 9.8 CRITICAL
In the Tenda ac9 v1.0 router with firmware V15.03.05.14_multi, there is a stack overflow vulnerability in /goform/WifiWpsStart, which may lead to remote arbitrary code execution.
CVE-2025-45427 1 Tenda 2 Ac9, Ac9 Firmware 2025-04-30 N/A 9.8 CRITICAL
In Tenda AC9 v1.0 with firmware V15.03.05.14_multi, the security parameter of /goform/WifiBasicSet has a stack overflow vulnerability, which can lead to remote arbitrary code execution.
CVE-2024-27570 1 Libtor 2 Lbt-t300-t390, Lbt-t300-t390 Firmware 2025-04-30 N/A 7.5 HIGH
LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the generate_conf_router function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-27571 1 Libtor 2 Lbt-t300-t390, Lbt-t300-t390 Firmware 2025-04-30 N/A 7.5 HIGH
LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the makeCurRemoteApList function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-27569 1 Libtor 2 Lbt-t300-t390, Lbt-t300-t390 Firmware 2025-04-30 N/A 6.5 MEDIUM
LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the init_nvram function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-27568 1 Libtor 2 Lbt-t300-t390, Lbt-t300-t390 Firmware 2025-04-30 N/A 6.5 MEDIUM
LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the apn_name_3g parameter in the setupEC20Apn function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-27567 1 Libtor 2 Lbt-t300-t390, Lbt-t300-t390 Firmware 2025-04-30 N/A 6.5 MEDIUM
LBT T300- T390 v2.2.1.8 were discovered to contain a stack overflow via the vpn_client_ip parameter in the config_vpn_pptp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2025-42599 1 Qualitia 1 Active\! Mail 2025-04-29 N/A 9.8 CRITICAL
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.