CVE-2025-25568

SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. NOTE: the Supplier disputes this because the use-after-free is not in the VPN software, but is instead in a separate tool that has no untrusted input and runs under the user's own privileges (it is a stress-testing tool for a networking stack).
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:softether:vpn:5.02.5187:*:*:*:*:*:*:*

History

19 Jul 2025, 02:15

Type Values Removed Values Added
Summary SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. NOTE: the Supplier disputes this because the use-after-free is not in the VPN software, but is instead in a separate tool that has no untrusted input and runs under the user's own privileges (it is a stress-testing tool for a networking stack).
References
  • () https://filecenter.softether-upload.com/d/250715_001_79538/CVE-2025-25568.pdf -

02 Apr 2025, 20:36

Type Values Removed Values Added
CPE cpe:2.3:a:softether:vpn:5.02.5187:*:*:*:*:*:*:*
References () https://lzydry.github.io/CVE-2025-25568/ - () https://lzydry.github.io/CVE-2025-25568/ - Exploit
First Time Softether vpn
Softether

12 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-12 16:15

Updated : 2025-07-19 02:15


NVD link : CVE-2025-25568

Mitre link : CVE-2025-25568


JSON object : View

Products Affected

softether

  • vpn
CWE

No CWE.