A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00473154 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_sec_set_5g and wl_sec_rp_set_5g in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
References
| Link | Resource |
|---|---|
| https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-13 16:15
Updated : 2025-08-15 19:26
NVD link : CVE-2025-50611
Mitre link : CVE-2025-50611
CVE.ORG link : CVE-2025-50611
JSON object : View
Products Affected
netis-systems
- wf2880_firmware
- wf2880
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
