First published: Wed Apr 16 2025(Updated: )
SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. Versions 5.02.5184 to 5.02.5187 are vulnerable to NULL dereference in `DeleteIPv6DefaultRouterInRA` called by `StorePacket`. Before dereferencing, `DeleteIPv6DefaultRouterInRA` does not account for `ParsePacket` returning NULL, resulting in the program crashing. A patched version does not exist at this time.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
SoftEther VPN | >=5.02.5184<=5.02.5187 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32787 is considered a high severity vulnerability due to the potential for remote code execution via NULL dereference.
To fix CVE-2025-32787, update your SoftEther VPN software to version 5.02.5188 or later.
SoftEther VPN versions 5.02.5184 to 5.02.5187 are affected by CVE-2025-32787.
CVE-2025-32787 is a NULL dereference vulnerability in the SoftEther VPN software.
Exploitation of CVE-2025-32787 may allow an attacker to crash the VPN service or execute arbitrary code on the affected system.