Filtered by CWE-121
Total 2923 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-63458 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-11-05 7.5 High
Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the timeZone parameter in the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-47360 2 Qnx, Qualcomm 72 Qnx, Qam8255p, Qam8255p Firmware and 69 more 2025-11-05 7.8 High
Memory corruption while processing client message during device management.
CVE-2025-20732 3 Mediatek, Mediatk, Openwrt 18 Mt6890, Mt7615, Mt7622 and 15 more 2025-11-05 5.3 Medium
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege (when OceReducedNeighborReport is disabled). User interaction is not needed for exploitation. Patch ID: WCNCR00441510; Issue ID: MSV-4139.
CVE-2025-20736 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 6.7 Medium
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435347; Issue ID: MSV-4049.
CVE-2025-20737 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 7.8 High
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00435343; Issue ID: MSV-4040.
CVE-2025-20738 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 6.7 Medium
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435342; Issue ID: MSV-4039.
CVE-2025-20739 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 6.7 Medium
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435340; Issue ID: MSV-4038.
CVE-2025-20746 6 Google, Linuxfoundation, Mediatek and 3 more 23 Android, Yocto, Mt2718 and 20 more 2025-11-05 6.7 Medium
In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10010441; Issue ID: MSV-3967.
CVE-2025-20747 6 Google, Linuxfoundation, Mediatek and 3 more 23 Android, Yocto, Mt2718 and 20 more 2025-11-05 6.7 Medium
In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10010443; Issue ID: MSV-3966.
CVE-2025-20749 2 Google, Mediatek 19 Android, Mt6789, Mt6835 and 16 more 2025-11-05 6.7 Medium
In charger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915493; Issue ID: MSV-3800.
CVE-2024-22667 2 Fedoraproject, Vim 2 Fedora, Vim 2025-11-04 7.8 High
Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
CVE-2023-42116 1 Exim 1 Exim 2025-11-04 9.8 Critical
Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515.
CVE-2023-40476 3 Gstreamer, Gstreamer Project, Redhat 3 Gstreamer, Gstreamer, Enterprise Linux 2025-11-04 8.8 High
GStreamer H265 Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H265 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-21768.
CVE-2023-35056 1 Yifanwireless 2 Yf325, Yf325 Firmware 2025-11-04 8.8 High
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the cgi_handler function.
CVE-2023-35055 1 Yifanwireless 2 Yf325, Yf325 Firmware 2025-11-04 8.8 High
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
CVE-2023-34426 1 Yifanwireless 2 Yf325, Yf325 Firmware 2025-11-04 9.8 Critical
A stack-based buffer overflow vulnerability exists in the httpd manage_request functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to stack-based buffer overflow. An attacker can send a network request to trigger this vulnerability.
CVE-2023-34365 1 Yifanwireless 2 Yf325, Yf325 Firmware 2025-11-04 9.8 Critical
A stack-based buffer overflow vulnerability exists in the libutils.so nvram_restore functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a buffer overflow. An attacker can send a network request to trigger this vulnerability.
CVE-2023-31272 1 Yifanwireless 2 Yf325, Yf325 Firmware 2025-11-04 8.8 High
A stack-based buffer overflow vulnerability exists in the httpd do_wds functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to stack-based buffer overflow. An attacker can send a network request to trigger this vulnerability.
CVE-2023-28393 1 Accusoft 1 Imagegear 2025-11-04 5.6 Medium
A stack-based buffer overflow vulnerability exists in the tif_processing_dng_channel_count functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2023-25124 1 Milesight 2 Ur32l, Ur32l Firmware 2025-11-04 7.2 High
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables.