SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. NOTE: the Supplier disputes this because the use-after-free is not in the VPN software, but is instead in a separate tool that has no untrusted input and runs under the user's own privileges (it is a stress-testing tool for a networking stack).
CVSS
No CVSS.
References
Configurations
History
19 Jul 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
Summary | SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. NOTE: the Supplier disputes this because the use-after-free is not in the VPN software, but is instead in a separate tool that has no untrusted input and runs under the user's own privileges (it is a stress-testing tool for a networking stack). | |
References |
|
02 Apr 2025, 20:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:softether:vpn:5.02.5187:*:*:*:*:*:*:* | |
References | () https://lzydry.github.io/CVE-2025-25568/ - Exploit | |
First Time |
Softether vpn
Softether |
12 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 16:15
Updated : 2025-07-19 02:15
NVD link : CVE-2025-25568
Mitre link : CVE-2025-25568
JSON object : View
Products Affected
softether
- vpn
CWE
No CWE.