Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gmg137:snap7-rs:*:*:*:*:*:*:*:* |
Mon, 15 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gmg137
Gmg137 snap7-rs |
|
| Vendors & Products |
Gmg137
Gmg137 snap7-rs |
Sun, 14 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the function snap7_rs::client::S7Client::as_ct_write of the file /tests/snap7-rs/src/client.rs. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | gmg137 snap7-rs client.rs as_ct_write heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T05:51:39.225Z
Reserved: 2025-12-13T16:36:42.608Z
Link: CVE-2025-14673
Updated: 2025-12-15T19:45:42.495Z
Status : Modified
Published: 2025-12-14T18:15:43.783
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-14673
No data.
OpenCVE Enrichment
Updated: 2025-12-15T14:06:03Z