Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper access control vulnerability exists in Semtech LoRa LR11xxx transceivers running early versions of firmware where the memory write command accessible via the physical SPI interface fails to enforce write protection on the program call stack. An attacker with physical access to the SPI interface can overwrite stack memory to hijack program control flow and achieve limited arbitrary code execution. However, the impact is limited to the active attack session: the device's secure boot mechanism prevents persistent firmware modification, the crypto engine isolates cryptographic keys from direct firmware access, and all modifications are lost upon device reboot or loss of physical access. | |
| Title | Semtech LR11xx Memory Write Access Control Bypass | |
| First Time appeared |
Semtech
Semtech lr1110 Semtech lr1120 Semtech lr1121 |
|
| Weaknesses | CWE-123 | |
| CPEs | cpe:2.3:a:semtech:lr1110:*:*:*:*:*:*:*:* cpe:2.3:a:semtech:lr1120:*:*:*:*:*:*:*:* cpe:2.3:a:semtech:lr1121:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Semtech
Semtech lr1110 Semtech lr1120 Semtech lr1121 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SWI
Published:
Updated: 2026-04-07T20:42:41.466Z
Reserved: 2025-12-18T00:09:25.318Z
Link: CVE-2025-14857
Updated: 2026-04-07T20:38:09.550Z
Status : Received
Published: 2026-04-07T20:16:21.253
Modified: 2026-04-07T20:16:21.253
Link: CVE-2025-14857
No data.
OpenCVE Enrichment
No data.