CVE-2025-0720

A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.293480 Permissions Required VDB Entry
https://vuldb.com/?id.293480 Third Party Advisory VDB Entry
https://vuldb.com/?submit.482371 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*

History

No history.

Information

Published : 2025-01-26 23:15

Updated : 2025-10-09 20:53


NVD link : CVE-2025-0720

Mitre link : CVE-2025-0720

CVE.ORG link : CVE-2025-0720


JSON object : View

Products Affected

escanav

  • escan_anti-virus
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow