Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Jun 2025, 20:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linksys:wap610n_firmware:1.0.05.002:*:*:*:*:*:*:* cpe:2.3:h:linksys:wap610n:-:*:*:*:*:*:*:* |
|
References | () https://gist.github.com/XiaoCurry/f2365f4f6d18b2b4518ee20d5c091e1b - Broken Link | |
First Time |
Linksys
Linksys wap610n Firmware Linksys wap610n |
11 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 19:15
Updated : 2025-06-06 20:20
NVD link : CVE-2025-25522
Mitre link : CVE-2025-25522
JSON object : View
Products Affected
linksys
- wap610n_firmware
- wap610n
CWE
No CWE.