2025-02-13 19:04:13 +00:00

60 lines
2.1 KiB
JSON

{
"id": "CVE-2025-25525",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-11T20:15:38.727",
"lastModified": "2025-02-13T18:18:23.773",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in H3C FA3010L access points SWFA1B0V100R005 due to the lack of length verification, which is related to the setting of firewall rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands."
},
{
"lang": "es",
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en los puntos de acceso H3C FA3010L SWFA1B0V100R005 debido a la falta de verificaci\u00f3n de longitud, que est\u00e1 relacionada con la configuraci\u00f3n de las reglas del firewall. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/XiaoCurry/d797c3cce41678028ff2d20c4e12137e",
"source": "cve@mitre.org"
}
]
}