Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'SetUserPassword()' function, the 'newPassword' parameter is directly embedded in a shell command string using 'sprintf()' without any sanitisation or validation, and then executed using 'system()'. This allows an attacker to inject arbitrary shell commands that will be executed with the same privileges as the application.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'SetUserPassword()' function, the 'newPassword' parameter is directly embedded in a shell command string using 'sprintf()' without any sanitisation or validation, and then executed using 'system()'. This allows an attacker to inject arbitrary shell commands that will be executed with the same privileges as the application. | |
| Title | Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 | |
| First Time appeared |
Sge-plc1000 Sge-plc50
Sge-plc1000 Sge-plc50 circutor |
|
| Weaknesses | CWE-121 | |
| CPEs | cpe:2.3:a:sge-plc1000_sge-plc50:circutor:9.0.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Sge-plc1000 Sge-plc50
Sge-plc1000 Sge-plc50 circutor |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published: 2025-12-02T13:01:37.231Z
Updated: 2025-12-02T13:36:41.564Z
Reserved: 2025-10-15T12:06:16.258Z
Link: CVE-2025-11786
Updated: 2025-12-02T13:36:38.157Z
Status : Received
Published: 2025-12-02T13:15:50.493
Modified: 2025-12-02T13:15:50.493
Link: CVE-2025-11786
No data.