Due to improper input validation, a buffer overflow vulnerability is present in

Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain

conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Silabs
Silabs gecko Sdk
Silabs simplicity Sdk
Vendors & Products Silabs
Silabs gecko Sdk
Silabs simplicity Sdk

Fri, 17 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Description Due to improper input validation, a buffer overflow vulnerability is present in Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Title Zigbee Green Power Host Buffer Overflow Vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Silabs

Published:

Updated: 2025-10-17T17:20:32.188Z

Reserved: 2025-07-31T13:35:54.376Z

Link: CVE-2025-8414

cve-icon Vulnrichment

Updated: 2025-10-17T17:20:22.402Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-17T16:15:39.413

Modified: 2025-10-21T19:31:50.020

Link: CVE-2025-8414

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-20T13:22:02Z