Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4126 | Multiple buffer overflow vulnerabilities in Wavlink WL-WN575A3 RPT75A3.V4300, which are caused by not performing strict length checks on user-controlled data. By successfully exploiting the vulnerabilities, attackers can crash the remote devices or execute arbitrary commands without any authorization verification. |
Tue, 07 Oct 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink
Wavlink wl-wn575a3 Wavlink wl-wn575a3 Firmware |
|
| CPEs | cpe:2.3:h:wavlink:wl-wn575a3:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-wn575a3_firmware:rpt75a3.v4300:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wavlink
Wavlink wl-wn575a3 Wavlink wl-wn575a3 Firmware |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
cvssV3_1
|
Tue, 11 Feb 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple buffer overflow vulnerabilities in Wavlink WL-WN575A3 RPT75A3.V4300, which are caused by not performing strict length checks on user-controlled data. By successfully exploiting the vulnerabilities, attackers can crash the remote devices or execute arbitrary commands without any authorization verification. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T17:48:11.409Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-25528
Updated: 2025-02-13T17:46:55.406Z
Status : Analyzed
Published: 2025-02-11T20:15:39.090
Modified: 2025-10-07T20:56:32.667
Link: CVE-2025-25528
No data.
OpenCVE Enrichment
No data.
EUVD