Metrics
Affected Vendors & Products
Mon, 08 Sep 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | For Realtek AmebaD devices, a heap-based buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before version 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a heap-based buffer overflow. |
References |
|
Tue, 22 Jul 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-122 | |
CPEs | cpe:2.3:a:realtek:ameba_arduino_sdk:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Realtek
Realtek ameba-rtos-d Realtek ameba Arduino Sdk |
|
References |
|
|
Metrics |
cvssV3_1
|
Tue, 22 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 22 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | For Realtek AmebaD devices, a heap-based buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before version 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a heap-based buffer overflow. | DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
Fri, 18 Jul 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Realtek
Realtek ameba-rtos-d Realtek ameba Arduino Sdk |
|
CPEs | cpe:2.3:a:realtek:ameba-rtos-d:*:*:*:*:*:*:*:* cpe:2.3:a:realtek:ameba_arduino_sdk:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Realtek
Realtek ameba-rtos-d Realtek ameba Arduino Sdk |
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 09 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-122 | |
Metrics |
cvssV3_1
|
Wed, 09 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03 in Realtek AmebaD devices. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a buffer overflow. | For Realtek AmebaD devices, a heap-based buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before version 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a heap-based buffer overflow. |
Wed, 09 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03 in Realtek AmebaD devices. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a buffer overflow. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-08T14:50:03.258Z
Reserved: 2025-06-06T00:00:00.000Z
Link: CVE-2025-49604

Updated: 2025-07-09T20:46:03.345Z

Status : Received
Published: 2025-07-09T16:15:24.137
Modified: 2025-09-08T15:15:36.237
Link: CVE-2025-49604

No data.

No data.