diff --git a/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json b/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json index d9a45f190d897..786c9bbac4612 100644 --- a/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json +++ b/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json @@ -6,11 +6,11 @@ "aliases": [ "CVE-2025-60690" ], - "details": "A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching _0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.", + "details": "A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching _0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service (authentication to the web server hosted by httpd is required for the exploit to work).", "severity": [ { "type": "CVSS_V3", - "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/yifan20020708/SGTaint-0-day/blob/main/Linksys/Linksys-E1200/CVE-2025-60690.md" }, + { + "type": "WEB", + "url": "https://github.com/Jarrettgohxz/CVE-research/tree/main/Linksys/E1200-V2/CVE-2025-60690" + }, { "type": "WEB", "url": "https://www.linksys.com" @@ -41,4 +45,4 @@ "github_reviewed_at": null, "nvd_published_at": "2025-11-13T17:15:48Z" } -} \ No newline at end of file +}