From 30aaf443311b1c6c489707926eef1f5c4e6f0187 Mon Sep 17 00:00:00 2001 From: JarrettgxzSec Date: Sun, 15 Mar 2026 00:02:46 +0800 Subject: [PATCH] Revise details and severity for GHSA-xrf6-v8xr-fg2f **Updates** - CVSS v3 - Description - References **Comments** - Added additional reference for functional RCE PoC missing in the previous reference - Update `Privileged Required` from `None` to `Low` --- .../11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json b/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json index d9a45f190d897..786c9bbac4612 100644 --- a/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json +++ b/advisories/unreviewed/2025/11/GHSA-xrf6-v8xr-fg2f/GHSA-xrf6-v8xr-fg2f.json @@ -6,11 +6,11 @@ "aliases": [ "CVE-2025-60690" ], - "details": "A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching _0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication.", + "details": "A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching _0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service (authentication to the web server hosted by httpd is required for the exploit to work).", "severity": [ { "type": "CVSS_V3", - "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/yifan20020708/SGTaint-0-day/blob/main/Linksys/Linksys-E1200/CVE-2025-60690.md" }, + { + "type": "WEB", + "url": "https://github.com/Jarrettgohxz/CVE-research/tree/main/Linksys/E1200-V2/CVE-2025-60690" + }, { "type": "WEB", "url": "https://www.linksys.com" @@ -41,4 +45,4 @@ "github_reviewed_at": null, "nvd_published_at": "2025-11-13T17:15:48Z" } -} \ No newline at end of file +}