Impact
A heap‑based buffer overflow exists in the packet data processing routine of sx_smpd, which is used by the Silex Technology, Inc. products AMC Manager and SD‑330AC. An attacker who can send a specially crafted packet can trigger the overflow, resulting in a temporary denial‑of‑service condition. The weakness is a classic buffer overflow (CWE‑122) where insufficient bounds checking allows a user’s input to corrupt memory on the heap.
Affected Systems
The vulnerability affects Silex Technology, Inc. products: AMC Manager and SD‑330AC. Version information is not specified in the advisory, so all installations of these products are potentially at risk until a vendor patch is applied. The advisory references the Japanese security site JVN and the vendor’s own security advisory pages for more detail.
Risk and Exploitability
The CVSS score of 6.9 indicates a high impact, though the likelihood of exploitation is unclear as EPSS data is not available. The issue is not listed in the CISA KEV catalog, suggesting no known widespread exploitation yet. The attack vector is inferred to be remote or local packet injection to sx_smpd, as the flaw is triggered by malformed packet data. Mitigation requires vendor remediation and potential network filtering to reduce exposure.
OpenCVE Enrichment