Vulnerabilities (CVE)

Filtered by CWE-121
Total 2765 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-7704 2025-11-14 N/A 5.4 MEDIUM
Supermicro BMC Insyde SMASH shell program has a stacked-based overflow vulnerability
CVE-2024-37003 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-11-13 N/A 7.8 HIGH
A maliciously crafted DWG and SLDPRT file, when parsed in opennurbs.dll and ODXSW_DLL.dll through Autodesk applications, can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-54526 1 Fujielectric 1 Monitouch V-sft 2025-11-12 N/A 7.8 HIGH
Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer overflow while processing a specially crafted project file, which may allow an attacker to execute arbitrary code.
CVE-2025-63468 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the http_host parameter in the sub_426EF8 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63466 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the password parameter in the sub_426EF8 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63467 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_425400 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63469 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_421BAC function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63460 1 Totolink 2 A7000r, A7000r Firmware 2025-11-05 N/A 7.5 HIGH
Totolink A7000R v9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the ssid5g parameter in the sub_4222E0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63461 1 Totolink 2 A7000r, A7000r Firmware 2025-11-05 N/A 7.5 HIGH
Totolink A7000R v9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the ssid5g parameter in the urldecode function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63462 1 Totolink 2 A7000r, A7000r Firmware 2025-11-05 N/A 7.5 HIGH
Totolink A7000R v9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the wifiOff parameter in the sub_421A04 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63463 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the wifiOff parameter in the sub_4232EC function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63464 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_42396C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63465 1 Totolink 2 Lr350, Lr350 Firmware 2025-11-05 N/A 7.5 HIGH
Totolink LR350 v9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the ssid parameter in the sub_422880 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63459 1 Totolink 2 A7000r, A7000r Firmware 2025-11-05 N/A 7.5 HIGH
Totolink A7000R v9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the ssid5g parameter in the sub_421CF0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63454 1 Tenda 2 Ax3, Ax3 Firmware 2025-11-05 N/A 7.5 HIGH
Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow via the deviceId parameter in the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-63458 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-11-05 N/A 7.5 HIGH
Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the timeZone parameter in the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
CVE-2025-47360 1 Qualcomm 70 Qam8255p, Qam8255p Firmware, Qam8295p and 67 more 2025-11-05 N/A 7.8 HIGH
Memory corruption while processing client message during device management.
CVE-2025-20732 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 N/A 5.3 MEDIUM
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege (when OceReducedNeighborReport is disabled). User interaction is not needed for exploitation. Patch ID: WCNCR00441510; Issue ID: MSV-4139.
CVE-2025-20736 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 N/A 6.7 MEDIUM
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00435347; Issue ID: MSV-4049.
CVE-2025-20737 2 Mediatek, Openwrt 10 Mt6890, Mt7615, Mt7622 and 7 more 2025-11-05 N/A 7.8 HIGH
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00435343; Issue ID: MSV-4040.