A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.
History

Mon, 17 Nov 2025 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:linksys:e7350:-:*:*:*:*:*:*:*
cpe:2.3:o:linksys:e7350_firmware:1.1.00.032:*:*:*:*:*:*:*

Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Linksys
Linksys e7350
Linksys e7350 Firmware
Vendors & Products Linksys
Linksys e7350
Linksys e7350 Firmware

Thu, 13 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-13T00:00:00.000Z

Updated: 2025-11-13T17:40:07.176Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60695

cve-icon Vulnrichment

Updated: 2025-11-13T17:40:00.923Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-13T17:15:49.503

Modified: 2025-11-17T19:55:43.077

Link: CVE-2025-60695

cve-icon Redhat

No data.