Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain
conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://community.silabs.com/068Vm00000WJZED |
|
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Silabs
Silabs gecko Sdk Silabs simplicity Sdk |
|
| Vendors & Products |
Silabs
Silabs gecko Sdk Silabs simplicity Sdk |
Fri, 17 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to improper input validation, a buffer overflow vulnerability is present in Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability. | |
| Title | Zigbee Green Power Host Buffer Overflow Vulnerability | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2025-10-17T17:20:32.188Z
Reserved: 2025-07-31T13:35:54.376Z
Link: CVE-2025-8414
Updated: 2025-10-17T17:20:22.402Z
Status : Deferred
Published: 2025-10-17T16:15:39.413
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-8414
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:22:02Z