Filtered by CWE-120
Total 3801 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-32324 1 Szlbt 2 Lbt-t300-t400, Lbt-t300-t400 Firmware 2025-08-20 7.8 High
Buffer Overflow vulnerability in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v.3.2 allows a local attacker to execute arbitrary code via the vpn_client_ip variable of the config_vpn_pptp function in rc program.
CVE-2025-46785 1 Zoom 5 Meeting Software Development Kit, Rooms, Rooms Controller and 2 more 2025-08-19 6.5 Medium
Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
CVE-2025-8940 1 Tenda 2 Ac20, Ac20 Firmware 2025-08-19 8.8 High
A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this vulnerability is the function strcpy of the file /goform/saveParentControlInfo. The manipulation of the argument Time leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-8939 1 Tenda 2 Ac20, Ac20 Firmware 2025-08-19 8.8 High
A vulnerability was determined in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/WifiGuestSet. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-21443 1 Qualcomm 72 Qam8255p, Qam8255p Firmware, Qam8295p and 69 more 2025-08-19 7.8 High
Memory corruption while processing message content in eAVB.
CVE-2025-6634 1 Autodesk 2 3ds Max, 3ds Max 2025-08-19 7.8 High
A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-5038 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-08-19 7.8 High
A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-5037 1 Autodesk 1 Revit 2025-08-19 7.8 High
A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-1660 1 Autodesk 4 Navisworks, Navisworks Freedom, Navisworks Manage and 1 more 2025-08-19 7.8 High
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-5048 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-08-19 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-1430 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-08-19 7.8 High
A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-1277 1 Autodesk 1 Revit 2025-08-19 7.8 High
A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-27071 1 Qualcomm 69 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 66 more 2025-08-19 7.3 High
Memory corruption while processing specific files in Powerline Communication Firmware.
CVE-2025-9007 1 Tenda 2 Ch22, Ch22 Firmware 2025-08-18 8.8 High
A vulnerability has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function formeditFileName of the file /goform/editFileName. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-9006 1 Tenda 2 Ch22, Ch22 Firmware 2025-08-18 8.8 High
A vulnerability was identified in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function formdelFileName of the file /goform/delFileName. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-50612 1 Netis-systems 2 Wf2880, Wf2880 Firmware 2025-08-18 7.5 High
A buffer overflow vulnerability has been discovered in the Netis WF2880 v2.1.40207 in the FUN_004743f8 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_sec_set in the payload, which may cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
CVE-2025-50613 1 Netis-systems 2 Wf2880, Wf2880 Firmware 2025-08-18 7.5 High
A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00475e1c function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wds_key_wep in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
CVE-2025-27072 1 Qualcomm 73 Qam8255p, Qam8255p Firmware, Qam8295p and 70 more 2025-08-18 5.5 Medium
Information disclosure while processing a packet at EAVB BE side with invalid header length.
CVE-2025-36525 1 F5 1 Big-ip Access Policy Manager 2025-08-18 7.5 High
When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-9023 1 Tenda 2 Ac18, Ac7 2025-08-16 8.8 High
A vulnerability has been found in Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Affected is the function formSetSchedLed of the file /goform/SetLEDCfg. The manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.