Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Belden
Belden hirschmann Eagle One Belden hirschmann Hisecos |
|
| Vendors & Products |
Belden
Belden hirschmann Eagle One Belden hirschmann Hisecos |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hirschmann HiSecOS devices versions prior to 05.3.03 contain a buffer overflow vulnerability in the HTTPS login interface when RADIUS authentication is enabled that allows remote attackers to crash the device or execute arbitrary code by submitting a password longer than 128 characters. Attackers can exploit improper bounds checking in password handling to overflow a fixed-size buffer and achieve denial of service or remote code execution. | |
| Title | Hirschmann HiSecOS Buffer Overflow via HTTPS Login | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:06:32.925Z
Reserved: 2026-04-03T21:16:19.764Z
Link: CVE-2018-25237
Updated: 2026-04-06T15:03:32.168Z
Status : Awaiting Analysis
Published: 2026-04-03T22:16:24.740
Modified: 2026-04-07T13:20:55.200
Link: CVE-2018-25237
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:22:06Z