Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
References
| Link | Resource |
|---|---|
| https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-02-11 19:15
Updated : 2025-06-06 20:20
NVD link : CVE-2025-25522
Mitre link : CVE-2025-25522
CVE.ORG link : CVE-2025-25522
JSON object : View
Products Affected
linksys
- wap610n_firmware
- wap610n
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
