Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 18 Nov 2025 08:15:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can overflow a 260-byte stack buffer via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC’s firmware operating system. Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

Tue, 18 Nov 2025 07:15:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can overflow a 260-byte stack buffer via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC’s firmware operating system.
Title Supermicro BMC SMASH services has a Stack-based buffer overflow vulnerability
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Supermicro

Published:

Updated: 2025-11-18T07:59:14.817Z

Reserved: 2025-07-14T06:39:34.861Z

Link: CVE-2025-7623

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-18T07:15:48.047

Modified: 2025-11-18T08:15:51.460

Link: CVE-2025-7623

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.