Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-104 |
|
Wed, 18 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaffected, the impact is limited to a low‑severity availability disruption. | |
| Title | Stack-Based Buffer Overflow in CLI Login Username Handling over CLI | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-18T13:32:24.892Z
Reserved: 2026-01-07T11:49:15.178Z
Link: CVE-2026-22321
Updated: 2026-03-18T13:32:21.211Z
Status : Awaiting Analysis
Published: 2026-03-18T08:16:29.527
Modified: 2026-03-18T14:52:44.227
Link: CVE-2026-22321
No data.
OpenCVE Enrichment
No data.