A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers controlling the contents of /sys/class/net/%s/address can trigger buffer overflows, leading to memory corruption, denial of service, or potential arbitrary code execution.
References
| Link | Resource |
|---|---|
| http://linksys.com | Product |
| https://github.com/yifan20020708/SGTaint-0-day/blob/main/Linksys/Linksys-E7350/CVE-2025-60695.md | Exploit Third Party Advisory |
| https://www.linksys.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-13 17:15
Updated : 2025-11-17 19:55
NVD link : CVE-2025-60695
Mitre link : CVE-2025-60695
CVE.ORG link : CVE-2025-60695
JSON object : View
Products Affected
linksys
- e7350
- e7350_firmware
CWE
CWE-121
Stack-based Buffer Overflow
