CVE-2025-1366

A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.295970 Permissions Required VDB Entry
https://vuldb.com/?id.295970 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*

History

No history.

Information

Published : 2025-02-17 01:15

Updated : 2025-10-09 20:44


NVD link : CVE-2025-1366

Mitre link : CVE-2025-1366

CVE.ORG link : CVE-2025-1366


JSON object : View

Products Affected

escanav

  • escan_anti-virus
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow