Buffer overflow vulnerability in Ruijie RG-NBR2600S Gateway 10.3(4b12) due to the lack of length verification, which is related to the configuration of source address NAT rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 5.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 11 Feb 2025 19:30:00 +0000

Type Values Removed Values Added
Description Buffer overflow vulnerability in Ruijie RG-NBR2600S Gateway 10.3(4b12) due to the lack of length verification, which is related to the configuration of source address NAT rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-11T00:00:00.000Z

Updated: 2025-02-13T17:44:50.509Z

Reserved: 2025-02-07T00:00:00.000Z

Link: CVE-2025-25527

cve-icon Vulnrichment

Updated: 2025-02-13T17:44:26.814Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-11T20:15:38.973

Modified: 2025-02-13T18:18:24.080

Link: CVE-2025-25527

cve-icon Redhat

No data.