A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the Function_00465620 of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of specify_parame in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
References
| Link | Resource |
|---|---|
| https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/2 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-13 16:15
Updated : 2025-08-15 19:19
NVD link : CVE-2025-50609
Mitre link : CVE-2025-50609
CVE.ORG link : CVE-2025-50609
JSON object : View
Products Affected
netis-systems
- wf2880_firmware
- wf2880
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
