Due to improper input validation, a buffer overflow vulnerability is present in
Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain
conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain
conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://community.silabs.com/068Vm00000WJZED |
![]() ![]() |
History
Fri, 17 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 17 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to improper input validation, a buffer overflow vulnerability is present in Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability. | |
Title | Zigbee Green Power Host Buffer Overflow Vulnerability | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2025-10-17T17:20:32.188Z
Reserved: 2025-07-31T13:35:54.376Z
Link: CVE-2025-8414

Updated: 2025-10-17T17:20:22.402Z

Status : Received
Published: 2025-10-17T16:15:39.413
Modified: 2025-10-17T16:15:39.413
Link: CVE-2025-8414

No data.

No data.