CVE-2025-25522

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

7.3high3.x
0246810

CVSS Score: 7.3/10

All CVSS Scores

CVSS 3.x
7.3

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Description

Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-120

Vulnerable Software (1)

Type: Configuration

Vendor: linksys

Product: wap610n_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "opera...

Source: nvd