Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 17 Nov 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:h:linksys:e1200:2:*:*:*:*:*:*:* cpe:2.3:o:linksys:e1200_firmware:2.0.11.001:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys e1200 Linksys e1200 Firmware |
|
| Vendors & Products |
Linksys
Linksys e1200 Linksys e1200 Firmware |
Thu, 13 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 13 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow exists in the get_merge_mac function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to six user-supplied CGI parameters matching <parameter>_0~5 into a fixed-size buffer (a2) without proper bounds checking, appending colon delimiters during concatenation. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute arbitrary code or cause denial of service without authentication. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-13T18:00:32.184Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60693
Updated: 2025-11-13T18:00:27.560Z
Status : Analyzed
Published: 2025-11-13T18:15:53.040
Modified: 2025-11-17T19:55:48.760
Link: CVE-2025-60693
No data.
OpenCVE Enrichment
Updated: 2025-11-14T09:29:13Z