First published: Tue Feb 11 2025(Updated: )
Multiple buffer overflow vulnerabilities in Wavlink WL-WN575A3 RPT75A3.V4300, which are caused by not performing strict length checks on user-controlled data. By successfully exploiting the vulnerabilities, attackers can crash the remote devices or execute arbitrary commands without any authorization verification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink WL-WN575A3 RPT75A3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25528 is considered a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2025-25528, you should apply the latest firmware updates provided by Wavlink for the WL-WN575A3 RPT75A3.
CVE-2025-25528 affects the Wavlink WL-WN575A3 RPT75A3 device.
Attackers can crash the Wavlink WL-WN575A3 RPT75A3 device or execute arbitrary commands without authorization.
Currently, no specific workarounds are recommended; updating the firmware is the best course of action.