Due to improper input validation, a buffer overflow vulnerability is present in

Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain

conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 17 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Description Due to improper input validation, a buffer overflow vulnerability is present in Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Title Zigbee Green Power Host Buffer Overflow Vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Silabs

Published:

Updated: 2025-10-17T17:20:32.188Z

Reserved: 2025-07-31T13:35:54.376Z

Link: CVE-2025-8414

cve-icon Vulnrichment

Updated: 2025-10-17T17:20:22.402Z

cve-icon NVD

Status : Received

Published: 2025-10-17T16:15:39.413

Modified: 2025-10-17T16:15:39.413

Link: CVE-2025-8414

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.