A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the function snap7_rs::client::S7Client::as_ct_write of the file /tests/snap7-rs/src/client.rs. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://gitee.com/gmg137/snap7-rs/issues/ID2H74 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.336402 | Permissions Required VDB Entry |
| https://vuldb.com/?id.336402 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-14 18:15
Updated : 2026-01-12 14:43
NVD link : CVE-2025-14673
Mitre link : CVE-2025-14673
CVE.ORG link : CVE-2025-14673
JSON object : View
Products Affected
gmg137
- snap7-rs
