Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 17 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:linksys:e7350:-:*:*:*:*:*:*:* cpe:2.3:o:linksys:e7350_firmware:1.1.00.032:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys e7350 Linksys e7350 Firmware |
|
| Vendors & Products |
Linksys
Linksys e7350 Linksys e7350 Firmware |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T17:40:07.176Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60695
Updated: 2025-11-13T17:40:00.923Z
Status : Analyzed
Published: 2025-11-13T17:15:49.503
Modified: 2025-11-17T19:55:43.077
Link: CVE-2025-60695
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:28:12Z