Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'showMeterReport()' function, there is an unlimited user input that is copied to a fixed-size buffer via 'sprintf()'. The 'GetParameter(meter)' function retrieves the user input, which is directly incorporated into a buffer without size validation. An attacker can provide an excessively large input for the “meter” parameter.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products-0 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-02 13:15
Updated : 2025-12-03 19:08
NVD link : CVE-2025-11780
Mitre link : CVE-2025-11780
CVE.ORG link : CVE-2025-11780
JSON object : View
Products Affected
circutor
- sge-plc1000_firmware
- sge-plc50_firmware
- sge-plc50
- sge-plc1000
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
