Vulnerabilities (CVE)

Filtered by CWE-120
Total 3440 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-7758 1 Totolink 2 T6, T6 Firmware 2025-07-23 9.0 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, has been found in TOTOLINK T6 up to 4.1.5cu.748_B20211015. Affected by this issue is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7837 1 Totolink 2 T6, T6 Firmware 2025-07-23 9.0 HIGH 8.8 HIGH
A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this issue is the function recvSlaveStaInfo of the component MQTT Service. The manipulation of the argument dest leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7914 1 Tenda 2 Ac6, Ac6 Firmware 2025-07-23 9.0 HIGH 8.8 HIGH
A vulnerability has been found in Tenda AC6 15.03.06.50 and classified as critical. Affected by this vulnerability is the function setparentcontrolinfo of the component httpd. The manipulation leads to buffer overflow. The attack can be launched remotely.
CVE-2025-7913 1 Totolink 2 T6, T6 Firmware 2025-07-23 9.0 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. Affected is the function updateWifiInfo of the component MQTT Service. The manipulation of the argument serverIp leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7912 1 Totolink 2 T6, T6 Firmware 2025-07-23 9.0 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, has been found in TOTOLINK T6 4.1.5cu.748_B20211015. This issue affects the function recvSlaveUpgstatus of the component MQTT Service. The manipulation of the argument s leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-33302 1 Fortinet 2 Fortimail, Fortindr 2025-07-23 N/A 4.7 MEDIUM
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiMail webmail and administrative interface version 6.4.0 through 6.4.4 and before 6.2.6 and FortiNDR administrative interface version 7.2.0 and before 7.1.0 allows an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests.
CVE-2025-8019 2025-07-23 9.0 HIGH 8.8 HIGH
A vulnerability was found in Shenzhen Libituo Technology LBT-T300-T310 2.2.3.6. It has been rated as critical. Affected by this issue is the function sub_40B6F0 of the file at/appy.cgi. The manipulation of the argument wan_proto leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-31701 2025-07-23 N/A 8.1 HIGH
A vulnerability has been found in Dahua products. Attackers could exploit a buffer overflow vulnerability by sending specially crafted malicious packets, potentially causing service disruption (e.g., crashes) or remote code execution (RCE). Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.
CVE-2025-31700 2025-07-23 N/A 8.1 HIGH
A vulnerability has been found in Dahua products. Attackers could exploit a buffer overflow vulnerability by sending specially crafted malicious packets, potentially causing service disruption (e.g., crashes) or remote code execution (RCE). Some devices may have deployed protection mechanisms such as Address Space Layout Randomization (ASLR), which reduces the likelihood of successful RCE exploitation. However, denial-of-service (DoS) attacks remain a concern.
CVE-2025-29480 1 Osgeo 1 Gdal 2025-07-23 N/A 5.5 MEDIUM
Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to cause a denial of service via the OGRSpatialReference::Release function. NOTE: the Supplier indicates that the report is invalid and could not be reproduced.
CVE-2025-5037 1 Autodesk 1 Revit 2025-07-22 N/A 7.8 HIGH
A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-53888 2025-07-22 N/A N/A
RIOT-OS, an operating system that supports Internet of Things devices, has an ineffective size check implemented with `assert()` can lead to buffer overflow in versions up to and including 2025.04. Assertions are usually compiled out in production builds. If assertions are the only defense against untrusted inputs, the software may be exposed to attacks that utilize the lack of proper input checks. In the `l2filter_add()` function shown below, `addr_len` is checked using an assertion and is subsequently used as an argument in a `memcpy()` call. When assertions are disabled, there would be no size check for `addr_len`. As a consequence, if an attacker were to provide an `addr_len` value larger than `CONFIG_L2FILTER_ADDR_MAXLEN`, they can trigger a buffer overflow and write past the `list[i].addr` buffer. If the unchecked input is attacker-controlled, the impact of the buffer overflow can range from a denial of service to arbitrary code execution. Commit f6f7de4ccc107c018630e4c15500825caf02e1c2 contains a patch for the vulnerability.
CVE-2025-7945 2025-07-22 9.0 HIGH 8.8 HIGH
A vulnerability was found in D-Link DIR-513 up to 20190831. It has been declared as critical. This vulnerability affects the function formSetWanDhcpplus of the file /goform/formSetWanDhcpplus. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-21445 1 Qualcomm 54 Qam8255p, Qam8255p Firmware, Qam8295p and 51 more 2025-07-21 N/A 7.8 HIGH
Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host.
CVE-2025-21444 1 Qualcomm 54 Qam8255p, Qam8255p Firmware, Qam8295p and 51 more 2025-07-21 N/A 7.8 HIGH
Memory corruption while copying the result to the transmission queue in EMAC.
CVE-2025-21426 1 Qualcomm 20 Fastconnect 7800, Fastconnect 7800 Firmware, Snapdragon Ar1 Gen 1 Platform and 17 more 2025-07-21 N/A 6.6 MEDIUM
Memory corruption while processing camera TPG write request.
CVE-2025-27043 1 Qualcomm 412 Ar8035, Ar8035 Firmware, Csr8811 and 409 more 2025-07-21 N/A 7.8 HIGH
Memory corruption while processing manipulated payload in video firmware.
CVE-2025-27058 1 Qualcomm 16 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 13 more 2025-07-21 N/A 7.8 HIGH
Memory corruption while processing packet data with exceedingly large packet.
CVE-2025-27052 1 Qualcomm 312 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 309 more 2025-07-21 N/A 7.8 HIGH
Memory corruption while processing data packets in diag received from Unix clients.
CVE-2025-25567 1 Softether 1 Vpn 2025-07-19 N/A 9.8 CRITICAL
SoftEther VPN 5.02.5187 is vulnerable to Buffer Overflow in Internat.c via the UniToStrForSingleChars function. NOTE: the Supplier disputes this because the behavior only enables a local user to attack himself through the UI,