A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 17 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:linksys:e7350:-:*:*:*:*:*:*:* cpe:2.3:o:linksys:e7350_firmware:1.1.00.032:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys e7350 Linksys e7350 Firmware |
|
| Vendors & Products |
Linksys
Linksys e7350 Linksys e7350 Firmware |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-13T00:00:00.000Z
Updated: 2025-11-13T17:40:07.176Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60695
Updated: 2025-11-13T17:40:00.923Z
Status : Analyzed
Published: 2025-11-13T17:15:49.503
Modified: 2025-11-17T19:55:43.077
Link: CVE-2025-60695
No data.