Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Supermicro
Supermicro mbd-x13sedw-f
Vendors & Products Supermicro
Supermicro mbd-x13sedw-f

Tue, 18 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 08:15:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can overflow a 260-byte stack buffer via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC’s firmware operating system. Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

Tue, 18 Nov 2025 07:15:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can overflow a 260-byte stack buffer via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC’s firmware operating system.
Title Supermicro BMC SMASH services has a Stack-based buffer overflow vulnerability
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Supermicro

Published:

Updated: 2025-11-18T16:15:33.824Z

Reserved: 2025-07-14T06:39:34.861Z

Link: CVE-2025-7623

cve-icon Vulnrichment

Updated: 2025-11-18T16:15:30.676Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-18T07:15:48.047

Modified: 2025-11-18T14:06:29.817

Link: CVE-2025-7623

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-19T10:47:57Z

Weaknesses