Impact
The vulnerability resides in the netfilter packet‑filtering modules nf_tables.h, nft_byteorder.c, and nft_meta.c of No‑Chicken Echo‑Mate. Improper handling of values in these kernel sources can lead to out‑of‑bounds memory accesses or logic errors, as indicated by CWE‑229. An attacker could craft malicious network packets that trigger the fault, potentially causing the kernel to execute unintended code or crash, which could lead to privilege escalation or a denial‑of‑service of the device.
Affected Systems
All instances of No‑Chicken Echo‑Mate running firmware versions prior to V250329. No other vendors or products are listed as impacted by the CNA.
Risk and Exploitability
The CVSS score of 7.3 classifies this as a high‑severity flaw, and while it is not listed in CISA’s KEV catalog, its presence in kernel space makes it critical. Because the EPSS score is unavailable, the actual exploitation likelihood cannot be quantified, but the vulnerability can be exercised remotely by sending crafted packets to the device’s network interface. Administrators should treat it as a remote kernel exploitation risk.
OpenCVE Enrichment