24h | 7d | 30d

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary, specifically in the sub_40BFA4 function that handles network interface reinitialization from '/var/system/linux_vlan_reinit'. Input is only partially validated by checking the prefix of interface names, and is concatenated into shell commands executed via system() without escaping. An attacker with write access to this file can execute arbitrary commands on the device.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 13 hours ago

Overview

  • IBM
  • AIX

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
HIGH (8.2)
EPSS
Pending

KEV

Description

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request to write arbitrary files on the system.

Statistics

  • 1 Post
  • 8 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture

Y'all like AIX vulns, right? How about four of them? Okay well what if three are sev:CRIT? Fine, one is a perfect 10 if that's what it takes to get y'all to care. 🥳

ibm.com/support/pages/node/725

Vulnerabilities in AIX could allow a remote attacker to execute arbitrary commands (CVE-2025-36251, CVE-2025-36250), obtain Network Installation Manager (NIM) private keys (CVE-2025-36096), or traverse directories (CVE-2025-36236). These vulnerabilities are addressed through the fixes referenced as part of this bulletin. These vulnerabilities are exploitable only when an attacker can establish network connectivity to the affected host.

  • 4
  • 4
  • 0
  • 7h ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (sub_42F32C function). The web interface reads the "lang" parameter and constructs Help URL strings using sprintf() into fixed-size stack buffers without proper length validation. Maliciously crafted input can overflow these buffers, potentially leading to arbitrary code execution or memory corruption, without requiring authentication.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 13 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A local stack-based buffer overflow vulnerability exists in the infostat.cgi and cstecgi.cgi binaries of ToToLink routers (A720R V4.1.5cu.614_B20230630, LR1200GB V9.1.0u.6619_B20230130, and NR1800X V9.1.0u.6681_B20230703). Both programs parse the contents of /proc/net/arp using sscanf() with "%s" format specifiers into fixed-size stack buffers without length validation. Specifically, one function writes user-controlled data into a single-byte buffer, and the other into adjacent small arrays without bounds checking. An attacker who controls the contents of /proc/net/arp can trigger memory corruption, leading to denial of service or potential arbitrary code execution.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 13 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

An unauthenticated command injection vulnerability exists in the ToToLink LR1200GB Router firmware V9.1.0u.6619_B20230130 within the cstecgi.cgi binary (sub_41EC68 function). The binary reads the "imei" parameter from a web request and verifies only that it is 15 characters long. The parameter is then directly inserted into a system command using sprintf() and executed with system(). Maliciously crafted IMEI input can execute arbitrary commands on the router without authentication.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 13 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (setDefResponse function). The binary reads the "IpAddress" parameter from a web request and copies it into a fixed-size stack buffer using strcpy() without any length validation. Maliciously crafted input can overflow the buffer, leading to potential arbitrary code execution or memory corruption, without requiring authentication.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 13 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching <parameter>_0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 12 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack-based buffer overflow vulnerability exists in the libshared.so library of Cisco Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The functions get_mac_from_ip and get_ip_from_mac use sscanf with overly permissive "%100s" format specifiers to parse entries from /proc/net/arp into fixed-size buffers (v6: 50 bytes, v7 sub-arrays: 50 bytes). This allows local attackers controlling the contents of /proc/net/arp to overflow stack buffers, leading to memory corruption, denial of service, or potential arbitrary code execution.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 12 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The apply_cgi and block_cgi functions copy user-supplied input from the "url" CGI parameter into stack buffers (v36, v29) using sprintf without bounds checking. Because these buffers are allocated as single-byte variables, any non-empty input will trigger a buffer overflow. Remote attackers can exploit this vulnerability via crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 12 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack-based buffer overflow vulnerability exists in the makeRequest.cgi binary of Linksys RE7000 routers (Firmware FW_v2.0.15_211230_1012). The arplookup function parses lines from /proc/net/arp using sscanf("%16s ... %18s ..."), storing results into buffers v6 (12 bytes) and v7 (20 bytes). Since the format specifiers allow up to 16 and 18 bytes respectively, oversized input can overflow the buffers, resulting in stack corruption. Local attackers controlling /proc/net/arp contents can exploit this issue to cause denial of service or potentially execute arbitrary code.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 12 hours ago
Showing 61 to 70 of 88 CVEs